Documente Academic
Documente Profesional
Documente Cultură
N
t
, w
2
, w
3
, ..., w
N
t
) with
w
i
_
e
j2n/2
N
p
N
t
, 0 n 2
N
p
1
_
, i = 2, . . . , N
t
. (2.4)
The total number of bits required for the feedback message is (N
t
1)N
p
. The
capacity of g-mode 1 was shown in [37] to be clearly better than the capacity of
TSC. Algorithm g-mode 1 also benets from the characteristics of EGT; since
there is no requirement for amplitude modications, more ecient amplier de-
signs can be implemented [41].
15
CHAPTER 2. THE CONCEPT OF TRANSMIT BEAMFORMING
2.3.3 Generalized Mode 2
Generalized Mode 2 ranks some (or all) of the channel gains [h
k
[
N
t
k=1
according to
their amplitudes, and adjusts their phases by applying g-mode 1. The transmitter
then chooses the amount of power to allocate to each antenna, to favor the better
channel conditions. Algorithm g-mode 2 is a suboptimal algorithm, due to the
fact that phases and amplitudes are adjusted independently. Its codebook J
contains all vectors w = (w
1
, w
2
, w
3
, ..., w
N
t
) with
w
i
_
k
e
j2n/2
N
p
, k = 1, . . . , N
t
and n = 0, . . . , 2
N
p
1
_
, i = 1, . . . , N
t
, (2.5)
where
k
are the amplitude weights satisfying the condition
N
t
k=1
2
k
= 1.
We note that for N
t
= 2 transmit antennas, N
p
= 3 phase feedback bits and
N
a
= 1 amplitude feedback bit, g-mode 2 resembles UTRA FDD Mode 2. In
UTRA FDD Mode 2, amplitudes are chosen as
1
=
0.8 and
2
=
0.2 for
the transmit antennas characterized by the strongest and weakest channel gains
respectively. These values were obtained through numerical simulations. Exact
theoretical values for the optimal amplitude weights of the two-antenna case were
found to be
1
=
0.7735 and
2
=
E{h
2
}
N
t
, (2.6)
where E. denotes expected value. Since we have considered that E|h|
2
= N
t
,
the expression can be simplied as follows:
( = E[h w[
2
. (2.7)
16
2.4. PERFORMANCE METRICS FOR CL TBF SCHEMES
The gain from TBF can also be viewed from the spectral eciency perspective.
Using Jensens inequality,
Elog
2
(1 +[h w[
2
) log
2
(1 +E[h w[
2
) = log
2
(1 +(), (2.8)
so ( determines the upper bound for the rate improvement that CSIT introduces.
Another common method for illustrating the performance of CL methods is out-
age probability. Outage probability is dened as the probability that the channel
is unable to support a rate of transmission R
out
(or the corresponding SINR
out
,
since these terms are directly connected). If we assume TBF, rate outage proba-
bility is given by
P(R < R
out
) = P
_
log
2
(1 +[h w[
2
) < R
out
_
, (2.9)
and SINR outage probability is given by
P(SINR < SINR
out
) = P
_
[h w[
2
< SINR
out
_
. (2.10)
17
CHAPTER 2. THE CONCEPT OF TRANSMIT BEAMFORMING
18
Chapter 3
Interference Management in
Two-tier HetNets
The shift towards overlaid co-channel network deployments has introduced fur-
ther challenges in the management of interference present in future networks.
Various techniques have been proposed for limiting the eect of cross-layer inter-
ference. The most important interference management schemes include open ac-
cess mechanism for FBSs, power control for FBSs, resource partitioning between
dierent layers, advanced receivers with interference cancellation capabilities, co-
operative transmissions between geographically separated BSs and multi-antenna
techniques.
3.1 Open Access Control Mechanism for Femto
Cells
Open access mechanism for femto cells is usually disregarded in heterogeneous
scenario modeling due to security reasons, limited backhaul bandwidth and shar-
ing concerns of owners. Despite its low popularity, the presence of open access
FBSs would immediately alleviate most of the interference problems that accom-
pany closed access. Theoretical studies [43] have shown that open access does
not pose a negative impact on the interference conditions of a heterogeneous net-
work, when compared to conventional macro single-layer deployments. In fact,
it is deduced that network capacity can increase linearly when open access FBSs
are deployed in multi-tier networks. In [44], the dominance of open against closed
access is highlighted through simulations, which illustrate that open access can
19
CHAPTER 3. INTERFERENCE MANAGEMENT IN TWO-TIER
HETNETS
boost the total cell throughput by 15 % compared to closed access. The observed
results can be justied intuitively. With open access, users would simply hand
over their connections to the strongest base station and no dead zones would be
created. As a consequence, the new optimal connections would lower the trans-
mission powers for the uplink and downlink directions in all base stations of the
multi-tier network. All these advantages would come at the cost of the extra
signaling, and the possible reduction in the performance of the femto cell user,
since resources would no longer be dedicated [45].
3.2 Power Control
Deployment of femto cells in CSG access method under co-channel operation with
the macro cell causes coverage holes in the macro layer. Several downlink power
control (PC) mechanisms have been investigated to combat the presence of dead
coverage zones, mainly through adjustments of the transmit powers at the FBS,
either in a xed or dynamic way [46]. The basic requirement is to limit the femto
coverage so that interference towards macro users is decreased, but at the same
time performance at the served femto UEs is not devastated.
Typically, FBSs set their transmit power after initial start-up, by sensing the
surrounding RF conditions, such as the neighbor FBSs list or the macro cell
coverage. Fixing the FBS node transmit power to its maximum allowed value
is not considered a good option and has already been disregarded [46]. In that
particular technical report, it is proposed that the FBS transmit power should
be settable from the maximum capable value down to a level of 0 dBm. This
procedure can even be assisted by global positioning system (GPS) receivers in
the FBS, through a mapping between maximum transmit power and number of
detected satellites or reception quality [47]. More specically, if the FBS is unable
to detect a sucient number of satellites, it can be deduced that it is well within
the building area and, thus, well isolated. Then, it can set its transmit power to
a higher level and still not pose a signicant threat to MUEs lying outside the
building.
In general, it has been shown that xed power does not provide good results
in all deployment scenarios, and that adaptive calibration of the transmit power
should be considered [7]. Calibration of FBS transmit power provides a method
to adaptively modify femto coverage, depending on the macro cell interference
levels [48]. The algorithm behind power calibration is based on measurements
20
3.3. RESOURCE PARTITIONING
Figure 3.1: Macro-femto cross-layer interference when transmit power in FBS is not properly
set [47]. In the left picture, the FBS is closer to the MBS so it sets its transmit power to a higher
level. This results to a wider indoor coverage area, but also produces more interference to the
MUE. In the right picture, the FBS is further away from the MBS so it sets its transmit power
to a lower level. This results to narrower indoor coverage area but also decreases interference
to the MUE.
done at the FBS, and involves assessing the received signals from the MBS and
other FBSs so that the general interference picture is drawn. In some cases,
though, the conditions experienced by femto and macro users might not coincide
with those observed by the femto (see Fig. 3.1). Thus, further assistance from
the users might be useful so that samples from dierent locations in the coverage
area are provided. This can be done through explicit feedback in the uplink,
estimation of the FBS-MUE path loss [49], or even through the failed attempts
of the MUE to access the CSG femto cell [48].
3.3 Resource Partitioning
Dividing the resources between macro and femto cells is an eective measure
against cross-layer interference. Resource partitioning can be performed both in
frequency and time domains, in a static, semi-dynamic or completely dynamic
way [50]. So far, most partitioning schemes regarding two-tier deployments focus
on the frequency domain, due to the fact that resource partitioning in the time-
domain requires standardized mechanisms for time synchronization among the
dierent layer transmitters, and this is considered a dicult task [50].
The simplest approach is to divide the total available spectrum into multiple
non-overlapping carriers, and assign a subset of these carriers to the macro layer,
and the remaining carriers to the femto layer. This approach also applies for
21
CHAPTER 3. INTERFERENCE MANAGEMENT IN TWO-TIER
HETNETS
Figure 3.2: Resource partitioning using an escape carrier [52]. The macro layer can use either
carrier f
1
or f
2
, but the femto layer is restricted to f
2
. When an MUE, which operates on
carrier f
2
, approaches an FBS, it senses high interference and attempts to switch to the escape
carrier f
1
where it experiences no interference.
the case of splitting a single carrier in multiple subbands. In [51], the authors
propose an algorithm for the optimal orthogonal spectrum allocation between
macro and femto cells, and also for further splitting of the dedicated femto band
among the individual femto cells. This orthogonal resource partitioning scheme
eliminates cross-layer interference completely, but its drawback is that it reduces
the spectrum usage eciency for the operator.
Due to the ineciency and cost of such a scheme, proposals that consider some
form of frequency reuse have been extensively investigated. One approach is the
use of two carriers, the rst of which serves as an escape carrier [52]. Consider
carriers f
1
and f
2
as shown in the Fig. 3.2.
In this case, both f
1
and f
2
carriers are assigned to the macro cell layer, but
only f
2
is assigned to the femto cell layer. When MUEs, which are assigned to the
f
2
carrier, sense high cross-layer interference from the transmission of a nearby
FBS, they will automatically issue a request for handover to the escape carrier
f
1
. This type of cross-layer interference mitigation is most attractive when the
deployment density of the FBSs is moderate. For dense FBS environments, this
method should be used in conjunction with PC. A variation of this approach is
dynamic carrier selection at each FBS, in which dierent FBSs are allowed to
choose either f
1
or f
2
as their carrier. Determination of the carrier frequency
could be random or based on measurements of neighboring interferer FBSs. This
approach primarily aims to leverage the co-layer interference between the FBSs,
but gains experienced by inter-frequency handover of interfered MUEs still exist,
even though they are not as high as in the static carrier allocation case.
Various other schemes involving resource partitioning have been presented in
22
3.4. SUCCESSIVE INTERFERENCE CANCELLATION
the academic and industrial literature. In [53], the direction of arrival (DoA) of
the MUE is compared to the direction range of the FBS, and the result determines
the type of scheduling that will be used. If the MUE is not in the direction range
of the FBS, it can use any of the available frequencies. Otherwise, the scheduling
priority of the frequency resources used by the FBS is set to a lower value, in order
to decrease the cross-layer interference towards the MUE. In [54], the macro cell
layer frequency resources are partitioned into contiguous non-overlapping sub-
bands under the fractional frequency reuse scheme (FFR), in which one subband
is assigned to the cell center zone and the remaining subbands are assigned to the
cell edge zone. The center band adopts a reuse factor of one, while the edge bands
adopt a larger reuse factor. For each subband, a dierent macro transmit power
is chosen. The claim of [54] is that such subband partitioning not only improves
the rates of the macro cell users, but also provides opportunities for simultaneous
femto cell transmissions through the same frequency resources, without emission
of extensive interference to the macro cell layer. In [55], the MBS senses when a
served MUE is in the vicinity of a high-interference femto cell and it dynamically
determines a set of resources that the FBS should restrict its transmission to.
This restriction message is then relayed through the MUE to the interferer FBS.
3.4 Successive Interference Cancellation
Successive interference cancellation (SIC) techniques have already been imple-
mented in 3G systems, and aim to exploit the structure of the interference through
reconstruction of the dominant interference signals and subtraction from the total
interference [56]. With SIC, the dominant interferer is the rst to be detected
and decoded, due to its high received power when compared to the remaining
interfering signals. Using accurate channel gain estimation, the decoded version
of the interfering signal is regenerated in such a way that it resembles the actual
received signal, and is then subtracted from the composite received signal. This
procedure can be repeated for the remaining interferers. After each step, the
next user to be decoded faces less and less interference. Usage of SIC alone is
not as eective in heterogeneous deployments, due to dierences in cross-layer
synchronization and opportunistic placements of femto nodes [57].
23
CHAPTER 3. INTERFERENCE MANAGEMENT IN TWO-TIER
HETNETS
3.5 Coordinated Multi-Point Transmission
Recently, a lot of emphasis has been given on so-called coordinated transmis-
sion methods that could minimize inter-cell interference. Coordinated Multi-point
(CoMP) [58][59][60] is a technique, incorporated in 3GPP LTE-Advanced, whose
purpose is to exploit or avoid co-channel interference and enhance primarily cell-
edge user throughput between MBSs. Improving the signal strength at cell edge
implies improving the interference situation of the whole two-tier deployment.
Downlink CoMP strategies require the cooperation of geographically sepa-
rated base stations, for determining the transmission scheme that will jointly
optimize performance among their corresponding UEs. In CoMP, procedures of
beamforming, scheduling and data transmission are performed jointly in an ex-
plicit manner between collaborating nodes. Architectures of CoMP can be either
1. centralized or
2. distributed,
depending on how UE feedback is shared among the transmission points. Both
architectures support two schemes for the coordination of the transmission points;
for downlink, CoMP schemes are divided into
1. Joint Processing (JP) and
2. Cooperative Scheduling/Beamforming (CS/CB).
Centralized architecture demands the presence of a central unit (CU), which is re-
sponsible for gathering and processing CSIT information from all individual UEs
served by a cluster of cooperating MBSs. The cooperating MBSs are connected
to the CU in star topology via low-latency backhaul links, such as optical ber.
These links carry signaling overhead and allow the cluster of MBSs to behave as
a single entity. Assuming FDD operation, UEs need to estimate CSIT informa-
tion regarding each MBS of the coordination cluster and report it to their own
serving (anchor) MBS. Each anchor MBS forwards the information received to
the central unit. Thus, global CSIT is only available at the CU. The CU jointly
processes the received CSI information to decide the scheduling of users and the
precoding parameters that each MBS should use. Finally, the CU forwards to
each MBS the chosen precoding parameters and transmission begins.
Distributed architecture was proposed in [61] to alleviate the challenges present
in the centralized architecture. In distributed architecture, the CU is completely
24
3.6. ALTRUISTIC BEAMFORMING
removed and backhaul links that connect MBSs are not necessary, since there is
no need for direct exchange of signaling or data information among MBSs any-
more. The benet of a distributed approach is that deployment does not stray
too much from that of conventional systems, so only minimal changes are re-
quired for adaptation. The simplication of the architecture introduces changes
in the framework. Firstly, UEs do not send feedback only to their anchor MBS,
but to each MBS of the coordination cluster. Secondly, the burden of scheduling
and precoding is shifted to each MBS. Thus, it is important that the scheduling
algorithms, which are performed independently at each MBS, are identical.
In JP, data towards a UE is shared among the cooperating MBSs. This scheme
exploits the low correlation of the geographically separated sites to improve the
data transmission. Transmission can be either coherent or non-coherent, depend-
ing on whether phase information feedback is available to combine the signals
at the receiver or in an opportunistic way. Joint processing oers two dierent
approaches for transmission of data. With joint transmission (JT), data trans-
mission can be performed simultaneously by multiple MBSs. With dynamic cell
selection (DCS), fast dynamic scheduling is executed, usually on a subframe-per-
subframe basis, and a single MBS is chosen to transmit data. This MBS can be
dierent from the anchor MBS of the UE. Schemes based on JP can oer large
performance gains, particularly for cell-edge users.
In CS/CB, only the anchor MBS has access to data of its served UE. This
scheme requires coordination of user scheduling and beamforming among the
MBSs of the cluster in order to enhance sum data rates and reduce interference.
Theoretically, CS/CB is always outperformed by JP, since the former aims to
avoid interference while the latter exploits interference and converts it to useful
signal. When the capacity limit of the backhaul is taken into account, though, it
has been observed that CS/CB can produce better results than JP [62]. A more
thorough presentation of CoMP architectures and transmission schemes can be
found in [61][63][64][65].
3.6 Altruistic Beamforming
Altruistic Beamforming is a technique, rst presented in [66], which boosts the
performance of a badly interfered UE by borrowing degrees of freedom from a
subset of its interferers. Although this technique was presented in the context of
co-layer femto interference, it can be directly adopted to cross-layer interference
25
CHAPTER 3. INTERFERENCE MANAGEMENT IN TWO-TIER
HETNETS
scenarios involving a highly interfered MUE and multiple FBS interferers. Altruis-
tic beamforming can be utilized in downlink cross-layer interference scenarios that
involve an MUE located in the vicinity of multiple FBSs, which operate simulta-
neously with xed transmit power. Initially, it is assumed that all transmitters
apply transmit beamforming in an egoistic manner, having as goal to maximize
the perceived rates of their own users. This results to severe degradation of the
SINR received at the MUE. In order to decrease the received cross-layer inter-
ference, the MUE establishes a control connection with a subset of its dominant
interferers and proposes that they change their beamforming vectors such that
power leakage is steered away from the MUE. When this procedure is followed
by multiple dominant FBSs, the quality of the MBS-MUE link is enhanced, since
the total interference is decreased signicantly.
The main tool used in Altruistic Beamforming are the modied TBF methods
(i.e. TSC, g-mode 1, g-mode 2) which were previously presented in section 2.3.
These methods can be adapted to combat interference without alteration of their
codebooks. The MBS acts always in an egoistic manner, deciding its beamforming
vector w from codebook J
m
according to equation
w = arg max
wW
m
[h
m
w[, (3.1)
where h
m
denotes the channel between MBS and MUE. In contrast, each inter-
ferer FBS substitutes the applied egoistic beamforming vector with the altruistic
one that minimizes interference, i.e. the optimal beamforming vector w for an
altruistic interferer FBS is now chosen from codebook J
f
according to
w = arg min
wW
f
[h
f
w[, (3.2)
where h
f
now denotes the interference channel between FBS and MUE. It should
be noted that the FBS is not given a choice of dierent beamforming vectors for
interference mitigation, but can only use the beamforming vector that minimizes
interference. A scheme for providing the FBS with multiple feedback weights was
presented in [67], where the victim MUE feeds back a list of candidate beam-
forming vectors and the FBS chooses the beamforming vector that degrades per-
formance as little as possible for its own FUE. In this thesis, we consider that
the MUE is not in a position to bargain, but needs all the help it can be oered;
therefore, only the minimizing beamforming vector is fed back.
The trade-o for the SINR improvement at the interfered MUE is the loss of
beamforming gain at each FBS, as implied by usage of the term altruistic. After
26
3.6. ALTRUISTIC BEAMFORMING
applying the MUE-proposed beamforming vector, FBSs do not take into account
the fast fading eect due to the randomness of the underlying wireless channel.
This tolerance on the degradation of femto cell performance can be well justied;
from the point of view of the operator, the macro cell is modeled as primary
infrastructure, since it promises ubiquitous coverage and is responsible for serving
a large number of subscribers [68]. From the performance side, the mean loss
from beamforming is not signicant, since the channel conditions experienced by
femto users are usually above average. Indeed, indoor deployment assures a low
attenuation environment, which is shielded against outdoor signals by means of
thick walls. Furthermore, minimum distance between FBS and FUE has been set
equal to 0.2 m [69]; therefore, it can be also assumed that FUEs are as close to
the FBS as needed to experience excellent channel conditions.
27
CHAPTER 3. INTERFERENCE MANAGEMENT IN TWO-TIER
HETNETS
28
Chapter 4
Generalized System Model
The general layout of our heterogeneous system model is shown in Fig. 4.1. The
network comprises of an MBS and a group of indoor FBSs, which operate in the
same frequency band. The FBSs are concentrated in a 5-by-5 apartment grid,
and each apartment is modeled as a square with no doors or windows. This type
of model was proposed in [69]. We consider that each apartment occupies an
area of 1515m
2
. It is assumed that FBSs are installed in a subset of the apart-
ments and, for simplicity, their location is xed at the center of each apartment.
Furthermore, FBSs operate simultaneously under CSG conguration, serving one
user each.
The studied interference scenario involves a user who is placed at a spe-
cic location, 5m from the right wall and 7m from upper wall inside the central
apartment of the block of ats. It is assumed that the user has not installed an
FBS at the specied apartment and, therefore, has no choice but to connect to
the macro BS. In such a scenario, the MUE is bound to receive a great amount
of interference from the surrounding FBSs and a weakened, but still acceptable,
signal from its serving MBS due to the additional wall penetration losses.
4.1 Adopted Assumptions
In our system model, the following assumptions have been made:
1. The block of ats is located suciently close to the macro cell center. Since
the block of apartments is far from the cell edge, interference from other
MBSs is overshadowed by interference from the FBS cluster (i.e. single
MBS system model).
29
CHAPTER 4. GENERALIZED SYSTEM MODEL
Figure 4.1: The system model comprises of a single MBS-MUE pair and multiple FBS-FUE
pairs. The FBSs are located inside a 5-by-5 apartment grid, at the center of apartments (blue
dots). All FUEs are randomly placed and experience very good channel conditions from their
serving FBS (red dots). The MUE is located in the central apartment (green dot), where no
FBS is available.
2. Each transmitter possesses 2 transmit antennas and each receiver a sin-
gle receive antenna (i.e. MISO system model). Channel gains related to
dierent antennas of the same MBS/FBS are modeled as i.i.d. zero-mean
circularly symmetric complex Gaussian RVs. Their values remain constant
over the duration of a block, and change independently between contigu-
ous blocks. Both MBS and FBSs transmit with constant power. Transmit
power of dierent FBSs is equal.
3. Transmissions are performed in FDD mode. The victim MUE is able to
perfectly estimate the downlink channels from the FBS interferers and can
establish low-rate, over-the-air and on-demand control connections for ex-
change of instantaneous channel information with a subset of them.
4. It is assumed that co-layer interference leakage between femto cellular net-
works and cross-layer leakage between macro and femto cellular networks
do not deteriorate the very good channel conditions of the individual femto
networks signicantly.
5. The impact of feedback delay and signaling errors is ignored. Focus is given
30
4.2. MEAN AND INSTANTANEOUS SINR AT THE MUE
on the quantization aspect of the feedback channel.
We remark that extension of the analysis to support multiple MUEs is straight-
forward. In the case of single carrier HSDPA, dierent MUEs can be scheduled
in time in the shared channel, so that the altruistic behavior of the FBSs can
change accordingly between transmission time intervals (TTIs) to t the needs of
each MUE. In the case of LTE and LTE-Advanced, hard frequency reuse can be
applied, and MUEs can be scheduled to receive in non-overlapping parts of the
spectrum, since OFDMA is used as air interface.
4.2 Mean and Instantaneous SINR at the MUE
Let o denote the set comprising of all FBSs interferers from the perspective of
the MUE. Consider the ordered set o
A
o, containing those FBSs that apply
altruistic TBF to mitigate instantaneous interference at the MUE. The ranking
is performed from strongest to weakest interferer, taking into account only their
large scale fading statistics. Order is important, since our aim is to mitigate the
fast fading term of the rst k strongest interferers, to provide the highest possible
performance gains. The set o
E
o, which is the complement of o
A
, contains the
remaining FBSs that perform egoistic TBF to favor their own FUEs. The mean
received power of all egoistic FBSs with indices i o
E
is grouped together with
thermal noise power and treated as background interference. Therefore, order is
not important for o
E
.
The MBS transmits with constant transmit power P
m
and all FBSs with
constant transmit power P
f
. The distance dependent path loss between MBS
and MUE is denoted as L
m
, while L
f
i
(i o) denotes the distance dependent
attenuation between altruistic FBS
i
and MUE. Thermal noise power is denoted
as P
n
. The mean received SINR at the MUE can then be represented as
SINR
mue
=
P
m
L
m
P
n
+
iS
E
P
f
L
f
i
+
iS
A
P
f
L
f
i
=
P
m
L
m
P
I
+
iS
A
P
f
L
f
i
=
P
m
P
I
L
m
1 +
iS
A
P
f
P
I
L
f
i
=
m
1 +
iS
A
f
i
. (4.1)
where
m
and
f
i
denote the mean received SINR at the MUE, from the MBS and
each FBS
i
respectively, when signals from egoistic users and thermal noise are
31
CHAPTER 4. GENERALIZED SYSTEM MODEL
forming the interference P
I
. Due to the denition of o
A
, the term
f
1
represents
the strongest interferer.
For the modeling of the instantaneous SINR at the MUE, we consider the fast
fading component in the egoistic MBS and the altruistic FBSs. Then, the channel
between MBS and MUE is h
m
= [h
m,1
h
m,2
], and the egoistic beamforming vector
applied is given by (2.1). Similarly, the channel between altruistic FBS
i
and MUE
is h
f
i
= [h
f
i
,1
h
f
i
,2
] and the beamforming vector applied by FBS
i
is given by (3.2).
The instantaneous SINR at the MUE is, then, given by
SINR
mue
=
m
[h
m
w
m
[
2
1 +
iS
A
f
i
[h
f
i
w
f
i
[
2
. (4.2)
4.3 System Parameters
Table 4.1: Simulation Parameters
Parameter Value
System Parameters
Carrier Frequency 2 GHz
Bandwidth 5 MHz
Thermal Noise PSD -174 dBm/Hz
UE Noise Figure 7 dB
Inner Wall Penetration Loss (L
iw
) 5 dB
Outer Wall Penetration Loss (L
ow
) 20 dB
MBS Parameters
MBS Tx Power 46 dBm
MBS Antenna Gain 18 dBi
Cable Losses 5 dB
FBS Parameters
FBS Tx Power 10 dBm
FBS Antenna Gain 0 dBi
To calculate the varying
m
,
f
i
parameters, we carry out simulations based on
the parameters of Table 4.1. To calculate the path loss attenuation, we consider
32
4.4. PROBABILISTIC MODELING OF INSTANTANEOUS RECEIVED
SINR
the path loss models presented in [69]. For indoor-initiated transmissions (i.e.
FBS to FUE and FBS to MUE) the path loss model is given by:
PL
in
(dB) = 38.46 + 20log
10
R + 0.7d
2D,in
+ 18.3n
((n+2)(n+1)0.46)
+ q L
iw
,
where R is the distance in meters between transmitter and receiver, d
2D,in
is the
part of this distance which is indoors, n is the number of oors that separate
transmitter and receiver, L
iw
is the penetration loss of inner walls and q is the
number of penetrated indoor walls that the signal must pass through. We will
study single oor cases, therefore n = 0. Also, all UEs will reside indoors, there-
fore R = d
2D,in
. For outdoor-initiated transmissions (i.e., MBS to FUEs and
MBS to MUE), the path loss model is given by
PL
out
(dB) = 15.3 + 37.6log
10
R + L
ow
+ q L
iw
,
where the term L
ow
refers to outer wall penetration loss.
4.4 Probabilistic Modeling of Instantaneous Re-
ceived SINR
The received instantaneous SINR of the MUE can be represented as an RV which
is a function of multiple RVs, i.e.
Z =
X
1 +
iS
A
Y
i
, (4.3)
where X =
m
[h
m
w
m
[
2
and Y
i
=
f
i
[h
f
i
w
f
i
[
2
.
In following chapters, we will present analytical expressions for the cumula-
tive distribution function (CDF) of Z, denoted as F
Z
(z). Another illustration of
the downlink performance of the MUE is the outage probability of its spectral
eciency (or rate distribution), which is directly obtained using F
Z
(z). It is well
known that downlink rate is a function of the received SINR, and specically
R = log
2
(1 +Z). The CDF F
R
(r) of R can be given in terms of F
Z
(z) as follows:
F
R
(r) = F
Z
(2
r
1). (4.4)
33
CHAPTER 4. GENERALIZED SYSTEM MODEL
34
Chapter 5
Perfect Phase Altruistic
Beamforming
In this chapter, we assume that capacity for the CL feedback link is unrestricted,
and we apply g-mode 1 to mitigate the eect of one dominant FBS interferer.
With perfect channel phase information fed back to the transmitter, the optimal
EGT weights can be applied and signals can be combined perfectly at the re-
ceiver. For the 2x1 MISO case, the signals sent from the antennas of the MBS,
which carry the same symbol, combine with zero phase dierence at the receiver,
while the interference signals from the dominant FBS combine in exactly opposite
phases (see Fig. 5.1).
Figure 5.1: In the case of unrestricted phase feedback,channel gains of the interfering signals
can be oriented in such a way that their phase dierence is 180 degrees.
The purpose of this study is to deduce the analytical upper bound for the perfor-
mance of the interfered MUE user under g-mode 1, in the 2x1 MISO case with
one dominant FBS interferer. Then, the performance of low-resolution quantized
feedback can be measured against this upper bound. To justify the claim of one
dominant interferer in the proposed system model, we assume that only one of
the adjacent apartments contains an FBS which is transmitting (Fig. 5.2). We
35
CHAPTER 5. PERFECT PHASE ALTRUISTIC BEAMFORMING
Figure 5.2: The system model comprises of a single MBS-MUE pair and 17 FBS-FUE pairs.
Only a single dominant interferer FBS is identied by the MUE, originating from the only
adjacent apartment that contains an FBS.
note that the analysis is not restricted to the proposed system model, but can be
directly applied to cases where the assumption of one dominant interferer is well
justied.
5.1 Received SINR with Unrestricted Phase Feed-
back Resolution
Let h = [h
1
h
2
], with h
1
= [h
1
[e
jh
1
and h
2
= [h
2
[e
jh
2
, be the channel gain
vector related to BS transmit antennas 1 and 2, respectively, and let w = [w
1
w
2
], with w
1
= [w
1
[e
jw
1
and w
2
= [w
2
[e
jw
2
, be the corresponding complex
beamforming weights per transmit antenna. We assume that h
1
and h
2
are com-
plex zero-mean Gaussian i.i.d. RVs with unitary variance. Beamforming vectors
w satisfy |w| = 1. The received instantaneous SNR at the target UE will then
36
5.1. RECEIVED SINR WITH UNRESTRICTED PHASE FEEDBACK
RESOLUTION
be
[h w[
2
= [h
1
w
1
+ h
2
w
2
[
2
= (h
1
w
1
+ h
2
w
2
)(h
1
w
1
+ h
2
w
2
)
= h
1
w
1
h
1
w
1
+ h
1
w
1
h
2
w
2
+ h
2
w
2
h
1
w
1
+ h
2
w
2
h
2
w
2
= [h
1
[
2
[w
1
[
2
+[h
2
[
2
[w
2
[
2
+ 2 Reh
1
w
1
h
2
w
= [h
1
[
2
[w
1
[
2
+[h
2
[
2
[w
2
[
2
+ 2 Re[h
1
[e
jh
1
[w
1
[e
jw
1
[h
2
[e
jh
2
[w
2
[e
jw
2
= [h
1
[
2
[w
1
[
2
+[h
2
[
2
[w
2
[
2
+ 2[h
1
[[h
2
[[w
1
[[w
2
[ cosh
1
+w
1
h
2
w
2
.
(5.1)
Without loss of generality, we can assume that h
1
R, since we are interested
in the relative phase of the two antennas. Then h
1
= w
1
= 0. In g-mode 1,
power is distributed equally among antennas, i.e., [w
1
[ = [w
2
[ =
1
2
. Then,
[h w[
2
=
1
2
[h
1
[
2
+
1
2
[h
2
[
2
+[h
1
[[h
2
[ cosh
2
w
2
. (5.2)
In order to maximize (5.2), the condition w
2
= h
2
should be satised. Then,
SNR
g-mode 1
max
= [h w[
2
max
=
1
2
[h
1
[
2
+
1
2
[h
2
[
2
+[h
1
[[h
2
[ =
1
2
([h
1
[ +[h
2
[)
2
. (5.3)
Similarly, to minimize (5.2), the condition w
2
= h
2
+ should be satised.
Then,
SNR
g-mode 1
min
= [h w[
2
min
=
1
2
[h
1
[
2
+
1
2
[h
2
[
2
[h
1
[[h
2
[ =
1
2
([h
1
[ [h
2
[)
2
. (5.4)
Equations (5.3) and (5.4) constitute upper and lower bounds of SNR when equal
power is distributed to both transmit antennas. In order to obtain the above
equations, h
1
and h
2
must be fully aligned; therefore, phases of weights w
1
and
w
2
are required to take continuous values in the interval (, ). This can be
realizable with g-mode 1 only theoretically, if the number of phase feedback bits
tends to innity (i.e. when N
p
).
In an interference scenario with one dominant FBS interferer, the received
SINR of the MUE under g-mode 1 with innite number of feedback bits is given
by
SINR
max
mue
=
x
[h
x
w
x
[
2
max
1 +
y
[h
y
w
y
[
2
min
. (5.5)
Parameter
x
denotes the mean SINR received from the MBS, while
y
denotes
the mean SNR received from the dominant FBS considering thermal noise and
37
CHAPTER 5. PERFECT PHASE ALTRUISTIC BEAMFORMING
signals from egoistic interferers as background interference. Vector h
x
= [h
x1
h
x2
]
expresses the channel between MBS and MUE, while h
y
= [h
y1
h
y2
] corresponds
to the channel between dominant FBS and MUE. Vector w
x
= [ w
x1
w
x2
]
T
is the
beamforming vector applied by the MBS to maximize the wanted SNR at the
MUE, while w
y
= [ w
y1
w
y2
]
T
is the beamforming vector applied by the dominant
FBS to minimize interference at the MUE.
In order to measure the performance of the received SINR, we will derive the
CDF of the RV
Z =
X
1 + Y
, (5.6)
with X =
x
[h
x
w
x
[
2
max
and Y =
y
[h
y
w
y
[
2
min
positive independent RVs.
5.2 Probability Distribution for Desired Signal
In this section, we present the probability density function (PDF) and CDF of
X =
x
[h
x
w
x
[
2
max
=
x
2
([h
x1
[ +[h
x2
[)
2
, (5.7)
which is the squared sum of two independent Rayleigh RVs (see (A.2) (A.4)
in Appendix A), scaled by a constant factor. Derivation of the PDF of X was
performed using the procedure found in [70] for determining the PDF of an RV
which is a function of multiple RVs. We apply this procedure step-by-step in
Appendix A (see (A.5) (A.12)).
We nd that the PDF of X is given by
f
X
(x) =
e
x
x
2
x
x
_
erf
_
_
x
x
_
+ 2
_
x
x
e
x
x
+
2x
x
erf
_
_
x
x
_
_
, (5.8)
where erf(x) =
2
_
x
0
e
t
2
dt denotes the error function.
The CDF is given by integration of (5.8):
F
X
(x) =
_
x
x
e
x
x
erf
__
x
x
_
e
2x
x
+ 1. (5.9)
38
5.3. PROBABILITY DISTRIBUTION FOR INTERFERING SIGNAL
5.3 Probability Distribution for Interfering Sig-
nal
Following the same procedure as for X, we present the PDF of
Y =
y
[h
y
w
y
[
2
min
=
y
2
([h
y1
[ [h
y2
[)
2
, (5.10)
which is the squared dierence of two Rayleigh variables, scaled by a constant
factor. The PDF is given by
f
Y
(y) =
e
y
y
2
y
y
_
erfc
_
_
y
y
_
+ 2
_
y
y
e
y
y
2y
y
erfc
_
_
y
y
__
, (5.11)
where erfc(y) = 1 erf(y) denotes the complementary error function.
5.4 Cumulative Distribution Function of SINR
In the previous sections, we presented the exact distributions of X and Y. The
CDF of Z =
X
1+Y
(i.e. the CDF of the RV representing the received SINR at the
MUE) can be calculated from the following integral:
F
Z
(z) =
_
1
F
X
(zt)f
Y
(t 1)dt, (5.12)
where F
X
(x) is the CDF of X and f
Y
(y) is the PDF of Y. Specically,
F
X
(zt) =
_
zt
x
e
zt
x
erf
__
zt
x
_
e
2zt
x
+ 1, (5.13)
f
Y
(t 1) =
e
t1
y
2
_
y
(t 1)
_
erf
_
t 1
y
_
+ 2
t 1
y
e
t1
y
2(t 1)
y
+
2(t 1)
y
erf
_
t 1
y
__
. (5.14)
Equation (5.12) includes the product of (5.13) and (5.14), which results to a sum
of fteen dierent terms. Thus, fteen integrals need to be calculated and added
for derivation of F
Z
(z). The exact integrals are presented in Appendix B (see
(B.1) (B.15)), along with their respective solutions (see (B.17) (B.31)), which
39
CHAPTER 5. PERFECT PHASE ALTRUISTIC BEAMFORMING
have been derived after tedious calculations. The nal formula for F
Z
(z) is the
sum of all computed integrals:
F
Z
(z) = 1 A
1
(z) +
e
(
a
z
b
z
2
+
1
y
)
(A
2
(z) A
3
(z)) 2e
2b
z
A
4
(z)+
2e
(
a
z
b
z
2
+
1
y
)
(A
5
(z) A
6
(z)), (5.15)
where
a
z
= 1 +
x
z
y
, b
z
=
z
x
, c
z
=
x
z
y
, k
i
=
(1)
i
i!(2i + 1)
,
A
1
(z) =
2e
2b
z
tan
1
__
1 +
2
c
z
_
c
z
(1 +
2
c
z
)
3
2
+
e
2b
z
(1 +
2
c
z
)
,
A
2
(z) =
n=0
k
n
2
_
3
2
_
a
n+
7
2
2
z
b
n+
3
2
2
z
c
3
2
z
W
n+
1
2
2
,
n
5
2
2
_
a
z
b
z
_
,
A
3
(z) =
n=0
k
n
_
1
2
_
a
n+
5
2
2
z
b
n+
1
2
2
z
c
1
2
z
W
n+
3
2
2
,
n
3
2
2
_
a
z
b
z
_
,
A
4
(z) =
n=0
n+1
m=0
k
n
(n + 1)! b
m
z
c
z
m! (1 + 2c
z
)
nm+2
,
A
5
(z) =
n=0
m=0
k
n
k
m
(m + 1)a
m+n+3
2
z
b
m+n+1
2
z
c
m+1
z
Wnm+1
2
,
nm2
2
_
a
z
b
z
_
,
A
6
(z) =
n=0
m=0
k
n
k
m
2(m + 2)a
m+n+4
2
z
b
m+n+2
2
z
c
m+2
z
Wnm
2
,
nm3
2
_
a
z
b
z
_
.
The results contain the Whittaker function W
,
(x), which is a standard form
of a conuent hypergeometric function and one of the two solutions of Whittakers
equation [71]. It is evident that the exact outage probability formula for perfect
phase feedback involves cumbersome operations. The nal formula requires com-
putations of nested innite sums, some of which need numerous iterations to
converge accurately, especially at low SINR values. Despite its non-friendly na-
ture, the resulting theoretical formula proves useful, since it is an illustration
of the best possible performance improvement under g-mode 1 and serves as a
measure against practical low-rate applications of g-mode 1.
For the scenario presented in Fig. 5.2, there are 17 interferer FBSs, of which
the closest one is the dominant interferer. For this case, using the proposed
parameters of Table 4.1 (see Chapter 4), the total mean interference plus noise
power perceived by the MUE is -64.08 dBm. The MBS is placed at 117.13 meters
40
5.4. CUMULATIVE DISTRIBUTION FUNCTION OF SINR
Figure 5.3: Goodness of t for the CDF of the upper bound SINR perceived by the MUE.
Theoretical upper bound is denoted by solid curve (-) and circles (), while simulations are
denoted by stars ().
away from the MUE, so that the received wanted signal is also -64.08 dBm after
distance dependent pathloss and penetration loss of an outer and two inner walls.
Simulations dictate that the mean SNRs at the MUE in the case of one dominant
interferer are
m,1dom
= 17.40 dB and
1,1dom
= 17.32 dB, from the MBS and the
dominant interferer, respectively.
The goodness of t for the rate outage probability of the MUE when compared
to simulations is shown in Fig. 5.3. In Fig. 5.4 we present simulations of g-mode 1
with N
p
= 1, N
p
= 2, N
p
= 3 phase bits and compare their performance against
the theoretical upper bound. It can be seen that even for 3 bits of phase feedback,
performance is already close to the upper bound corresponding to perfect phase
feedback. Therefore, it is practically achievable to reach performance close to the
upper bound with feedback messages of minimal size, and there is no necessity to
invest in high-rate feedback links when applying g-mode 1, since the rate gains
would be insignicant.
41
CHAPTER 5. PERFECT PHASE ALTRUISTIC BEAMFORMING
Figure 5.4: Comparison between practical low-rate realizations of g-mode 1 against the opti-
mum upper bound. Theoretical upper bound is denoted by solid curve (-), while simulations
are denoted by dashed curves (--). It can be seen that even with feedback message having size
as low as 4 bits (blue dashed curve), performance is already very close to the upper bound
which would require innite number of bits.
42
Chapter 6
Altruistic Beamforming in
Multiple Interference Sources
In this section we investigate the SINR and rate outage probability of the MUE
as a function of the number of altruistic interferers. We consider that 24 FBSs are
transmitting simultaneously in all apartments except the central one, in which the
MUE operates (Fig. 6.1). Initially, all FBSs behave egoistically by applying TSC,
g-mode 1 or g-mode 2. One-by-one, the interferers apply altruistic TBF, starting
from the strongest interferer and gradually reaching the weakest. As shown in
section 4.4, the SINR of the MUE in the presence of multiple altruistic interferer
FBSs can be modeled as Z =
X
1+
iS
A
Y
i
, where o
A
denotes the ordered set of altru-
istic FBSs according to received power at the MUE, X =
m
[h
m
w
m
[
2
represents
the desired MBS signal, and Y
i
=
f
i
[h
f
i
w
f
i
[
2
represents the interference signal
from altruistic FBS i.
6.1 Chi-squared Approximations for Desired and
Interference Signals
Since exact distributions of the individual RVs (i.e. X and Y
i
) are generally
dicult to nd, we will use those
2
approximations presented in [72]. Thus, X
can be approximated as a
2
RV with 4 degrees of freedom, while each interferer
43
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
Figure 6.1: The system model comprises of a single MBS-MUE pair and 24 FBS-FUE pairs.
The FBSs are located inside a 5-by-5 apartment grid, at the center of apartments (blue dots).
All FUEs are randomly placed and experience very good channel conditions from their serving
FBS (red dots). The MUE is located in the central apartment (green dot), where no FBS is
available.
Y
i
can be approximated as an exponential RV. More specically,
F
X
(x) = 1
_
1 +
2x
(
m
_
e
2x
G
m
x 0, (6.1)
f
Y
i
(y) =
1
g
i
f
i
e
y
g
i
f
i
y 0, (6.2)
with ( = E[h
m
w
m
[
2
and g
i
= E[h
f
i
w
f
i
[
2
denoting the beamforming gains
from egoistic and altruistic TBF, respectively. In case of TSC, expectations (
and g
i
(for i o
A
) admit values equal to:
( =
3
2
, g
i
=
1
2
. (6.3)
In case of g-mode 1 and g-mode 2, expectations ( and g
i
(for i o
A
) depend
on the number of phase bits N included in the feedback message. Closed-form
expressions for egoistic and altruistic beamforming gains were derived in [72].
Specically, for g-mode 1,
( = 1 +
4
a
N
, g
i
= 1
4
a
N
, a
N
=
2
N
sin
_
2
N
_
. (6.4)
44
6.2. EGOISTIC TBF IN ALL FBS INTERFERERS
Similarly, for g-mode 2,
( = 1 +
4
_
4
2
+ a
2
N
, g
i
= 1
4
_
4
2
+ a
2
N
. (6.5)
6.2 Egoistic TBF in all FBS Interferers
For the case of [o
A
[ = 0, where all FBS interferers apply egoistic beamforming,
the received SINR at the MUE follows a
2
distribution with signals from all
egoistic interferers considered as background noise. Then, the outage probability
for the received SINR at the MUE is given by:
F
Z
(0)
mue
(z) = 1
_
1 +
2z
(
m
_
e
2z
G
m
z 0, (6.6)
where Z
(0)
mue
denotes the SINR at the MUE with 0 dominant altruistic interferers,
and
m
m,|S
A
|=0
.
6.3 Altruistic TBF only in Dominant FBS In-
terferer
For the case of [o
A
[ = 1, where only one dominant FBS altruistic interferer is
considered, closed-form expressions for the SINR distribution of the victim MUE
have been presented in [73]. That work focused on co-layer interference, but
results directly apply to cross-layer interference scenarios, where the assumption
of a single dominant interferer is justied. The SINR outage probability for the
MUE user in case of a single dominant interferer is then given by
F
Z
(1)
mue
(z) = 1 e
2z
G
m
_ 2z G
m
g
1
f
1
(
G
m
g
1
f
1
+ 2z)
2
+
(1 +
2z
G
m
)
G
m
g
1
f
1
G
m
g
1
f
1
+ 2z
_
z 0, (6.7)
where
m
m,|S
A
|=1
,
f
1
f
1
,|S
A
|=1
.
6.4 Altruistic TBF in Multiple Dominant FBS
Interferers
In this section we assume that at least two FBS interferers apply altruistic TBF.
More specically, we investigate two cases, in which:
45
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
1. the mean received interference powers from dierent FBSs are dierent,
2. the mean received interference powers are equal. The former corresponds
to most practical real-life scenarios, while the latter represents a specic
case study with primarily theoretical value.
6.4.1 Multiple Interferers with Dierent Mean Received
Powers at the MUE
For cases with [o
A
[ = , with 2, we rst derive the PDF of the sum
iS
A
Y
i
of exponential RVs present in the denominator of (4.3). This requires repeated
usage of convolution, between the distributions of the interferers. For [o
A
[ = 2,
we nd that
f
Y
(y) =
_
_
ye
y
g
1
f
1
g
2
1
2
f
1
, if g
1
f
1
= g
2
f
2
,
e
y
g
2
f
2 e
y
g
1
f
1
g
2
f
2
g
1
f
1
otherwise,
(6.8)
with y 0,
m
m,|S
A
|=2
,
f
i
f
i
,|S
A
|=2
for i=1,2.
For the derivation of the generalized PDF, we assume that mean received pow-
ers from dierent transmitters dier at least slightly (i.e. g
i
f
i
,= g
j
f
j
, i ,= j).
This assumption, which applies to most practical scenarios, allows us to focus
on one branch of the convolution, at each stage. Then, successive convolutions
yield a pattern in the PDF derivation, which is given by the following closed-form
formula for [o
A
[ 2:
f
Y
(y) =
_
iS
A
1
g
i
f
i
_
jS
A
e
y
g
j
f
j
k=j
kS
A
_
1
g
k
f
k
1
g
j
f
j
_ y 0. (6.9)
For details on the derivation of the above formula, see [74]. The CDF of Z can
then be calculated by substituting (6.1) and (6.9) into the following formula [75]:
F
Z
(z) =
_
1
F
X
(zt)f
Y
(t 1)dt. (6.10)
46
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
After manipulations, the CDF of Z for [o
A
[ = , with 2 is found to be
F
Z
()
mue
(z) =
_
iS
A
1
g
i
f
i
_
jS
A
g
j
f
j
e
2z
G
m
_
1+
G
m
2z
1+
G
m
2zg
j
f
j
+
G
m
2z
(1+
G
m
2zg
j
f
j
)
2
_
k=j
kS
A
_
1
g
k
f
k
1
g
j
f
j
_ z 0, (6.11)
where
m
m,|S
A
|=
,
f
i
f
i
,|S
A
|=
for i = 1, 2, ..., .
For illustrating the results, we assume that the MBS applies egoistic g-mode 1
with length of feedback message equal to 2 bits. Figures 6.2-6.6 illustrate the out-
age capacity distribution for the MUE, when a variable number of FBS interferers
apply altruistic TBF using TSC, g-mode 1 with 2 and 3 phase feedback bits, and
g-mode 2 with a total of 3 and 4 feedback bits (i.e. 1 bit for amplitude and the
rest for phase). In general, it can be observed that theoretical and simulation
results match very well. Slight deviations, that do not aect results signicantly,
can be seen in the cases of g-mode 1 with 3 bits and g-mode 2 with 4 bits, which
result from the nature of the approximations used. Nevertheless, accurate results
are guaranteed for up to the 50th-percentile value.
For all modes, as the number of altruistic interferers increases, performance
gains can be observed until saturation is reached at the upper bound. The perfor-
mance dierence between the purely egoistic (red curve) and the purely altruistic
case (black curve) is smallest in the case of TSC; thus, only few interferers need
to be considered but the improvements in outage capacity are not dramatic. The
best performance achieved by TSC for the 50th-percentile outage capacity is ap-
proximately equal to 2 bps/Hz, which denotes an almost 67 % improvement over
the egoistic case of 1.2 bps/Hz. Usage of g-mode 1 with 2 bits provides better
results than TSC and can increase the 50th-percentile rate of the MUE to a value
of about 2.8 bps/Hz with the usage of one more feedback bit. By adding one
more bit (i.e. total of 3 bits), g-mode 1 continues to improve performance (i.e.
50th-percentile reaches 3 bps/Hz) but the improvement is less noticeable. It is
clear that g-mode 2 provides the best potential for MUE performance gains, with
a possible 4.2 bps/Hz value for the 50th-percentile outage capacity, corresponding
to an improvement of around 250% compared to the egoistic case.
47
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
Figure 6.2: MUE outage capacity when a variable number of interferers apply altruistic TSC.
Solid lines (-) and circles () depict the CDF which was derived analytically, while stars ()
mark the empirical CDF, obtained through simulations. Red line depicts the case when all
FBSs apply egoistic TBF. Green, blue, cyan and magenta lines correspond to cases where one,
two, three and four dominant interferer FBSs apply altruistic TBF, respectively. Black line
depicts the case where all interferer FBSs apply altruistic TBF.
48
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
Figure 6.3: MUE outage capacity when a variable number of interferers apply altruistic g-
mode 1 with 2 bits. Solid lines (-) and circles () depict the CDF which was derived analytically,
while stars () mark the empirical CDF, obtained through simulations. Red line depicts the case
when all FBSs apply egoistic TBF. Green, blue, cyan and magenta lines correspond to cases
where one, two, three and four dominant interferer FBSs apply altruistic TBF, respectively.
Black line depicts the case where all interferer FBSs apply altruistic TBF.
49
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
Figure 6.4: MUE outage capacity when a variable number of interferers apply altruistic g-
mode 1 with 3 bits. Solid lines (-) and circles () depict the CDF which was derived analytically,
while stars () mark the empirical CDF, obtained through simulations. Red line depicts the case
when all FBSs apply egoistic TBF. Green, blue, cyan and magenta lines correspond to cases
where one, two, three and four dominant interferer FBSs apply altruistic TBF, respectively.
Black line depicts the case where all interferer FBSs apply altruistic TBF.
50
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
Figure 6.5: MUE outage capacity when a variable number of interferers apply altruistic g-
mode 2 with 3 bits (i.e. 2 phase bits and 1 amplitude bit with optimal amplitude weights).
Solid lines (-) and circles () depict the CDF which was derived analytically, while stars ()
mark the empirical CDF, obtained through simulations. Red line depicts the case when all
FBSs apply egoistic TBF. Green, blue, cyan and magenta lines correspond to cases where one,
two, three and four dominant interferer FBSs apply altruistic TBF, respectively. Black line
depicts the case where all interferer FBSs apply altruistic TBF.
51
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
Figure 6.6: MUE outage capacity when a variable number of interferers apply altruistic g-
mode 2 with 4 bits (i.e. 3 phase bits and 1 amplitude bit with optimal amplitude weights).
Solid lines (-) and circles () depict the CDF which was derived analytically, while stars ()
mark the empirical CDF, obtained through simulations. Red line depicts the case when all
FBSs apply egoistic TBF. Green, blue, cyan and magenta lines correspond to cases where one,
two, three and four dominant interferer FBSs apply altruistic TBF, respectively. Black line
depicts the case where all interferer FBSs apply altruistic TBF.
52
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
The 10th and 50th percentile spectral eciency values are illustrated in gures
6.7 and 6.8 respectively. Curves for complete CSIT and complete phase CSIT
have also been included for comparison. It is evident that mitigation of more
than 12 interferers provides almost no gain for the MUE, independent of the
mode used. Thus, there is no need to sacrice the beamforming gain of any of
the 12 weakest interferers. Most importantly, it can be observed that curves have
almost constant slope for certain groups of altruistic interferers. This observation
yields that application of altruistic TBF provides best gains when it is performed
in clusters, taking advantage of the system topology. For the specic system
presented in Fig. 6.1, it is best to consider clusters of four interferers. The
rst cluster consists of the four dominant interferers and the remaining clusters
are dened in a similar way, according to their level of mean interference power
towards the MUE.
Consider the 10th-percentile outage capacity of Fig. 6.7. For the TSC case,
mitigation of the rst cluster is enough for reaching the performance upper bound.
For g-mode 1, mitigation of at most two clusters is sucient for reaching the up-
per bound. Indeed, even for innite number of available phase feedback bits,
considering more clusters provides no gain in performance. Algorithm g-mode 2
with 4 bits is the only method of those with limited feedback that still provides
noticeable gains in the 10th-percentile outage capacity when considering a third
cluster. In general, the above observations also apply for the 50th- percentile
outage capacity (see Fig. 6.8), even though there can be observed slight improve-
ments when considering a second cluster for TSC or a third cluster for g-mode 1.
From the above observations, it is clear that the optimal number of participating
clusters depends on the mode used and the chosen resolution for the feedback
message.
53
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
Figure 6.7: Theoretically derived 10th-percentile MUE outage capacity with respect to number
of altruistic FBS interferers. Red squared line () represents TSC. Orange diamond line ()
denotes g-mode 1 with 2 bits, while green left-pointing triangle line () denotes g-mode 1 with
3 bits. The blue dotted line (.-) represents g-mode 1 with innite feedback resolution. Cyan
right-pointing triangle line () represents g-mode 2 with 3 bits, while magenta circled line ()
depicts g-mode 2 with 4 bits. The black dotted line (.) represents complete cancellation of
interferers.
54
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
Figure 6.8: Theoretically derived 50th-percentile MUE outage capacity with respect to number
of altruistic FBS interferers. Red squared line () represents TSC. Orange diamond line ()
denotes g-mode 1 with 2 bits, while green left-pointing triangle line () denotes g-mode 1 with
3 bits. The blue dotted line (.-) represents g-mode 1 with innite feedback resolution. Cyan
right-pointing triangle line () represents g-mode 2 with 3 bits, while magenta circled line ()
depicts g-mode 2 with 4 bits. The black dotted line (.) represents complete cancellation of
interferers.
55
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
6.4.2 Multiple Interferers with Equal Received Powers at
the MUE
In the case that the mean received powers from a suciently large number of
interferers at the MUE are at the same level, the Central Limit Theorem (CLT)
can be applied for approximating the total interference power at the MUE as
a Gaussian distribution. More specically, the PDF of the sum of interference
Y =
iS
A
Y
i
is modeled as a truncated Gaussian PDF with mean equal to the
sum of the means and variance equal to the sum of the variances of the individual
interferers Y
i
. For simplicity, we assume that the mean received SNR from each
interferer has the same value , but the approximation also works well in cases
where mean SNRs from the dierent interferers have small deviations from that
value. Truncation is necessary, since each interferer RV represents a non-negative
SNR value, thus the sum cannot be negative. Although interferer RVs must be
i.i.d., this approach is independent of the actual distribution of each interferer;
therefore, it is not restricted to modeling each interferer RV as exponential.
If [o
A
[ = k interferers apply a certain altruistic beamforming method with
gain g, and the mean received SNR from each interferer to the MUE is , the
sum of interference can be modeled as a Gaussian RV, symbolized Y
Gauss
, with
PDF given by
f
Y
Gauss
(y) =
1
Q(
)
1
2
e
(y)
2
2
2
, (6.12)
where =
k
i=1
(g
i
i
) = k g is the mean value, =
_
k
i=1
(g
2
i
2
i
) =
_
k g
2
2
is the standard deviation and Q(.) denotes the Q-function given by the
formula Q(x) =
1
2
_
x
exp
_
u
2
2
du
_
. Considering X as a 4 degree-of-freedom
chi-squared RV with mean (
x
, the RV
Z =
X
1 +
iS
A
Y
i
=
X
1 + Y
Gauss
(6.13)
can be found by substitution of F
X
and f
Y
Gauss
into
F
Z
(z) =
_
1
F
X
(zt)f
Y
Gauss
(t 1)dt, (6.14)
After some manipulations, it can be shown that
F
Z
(z) =
1
Q(
)
_
1
2
erfc
_
2
_
2 z
(
m
e
2z
G
m
2
2
2
erfc
_
2 z
(
m
2
_
exp
_
2( + 1)z
(
m
+
2( z)
2
((
m
)
2
__
1
2
+
( + 1)z
(
m
2( z)
2
((
m
)
2
__
. (6.15)
56
6.4. ALTRUISTIC TBF IN MULTIPLE DOMINANT FBS INTERFERERS
Figure 6.9: SINR of MUE in the case of 10 interferers with received SNR mean value around 5
dB from each. The SNR from MBS is equal to the sum of interference. Gaussian approximation
for the sum interference signal power is used. Theoretical curves are denoted by solid curve (-)
and circles (), while simulations are denoted by stars ().
Consider a system model of 10 interferer FBSs with transmission powers such
that the individual SNR received at the MUE from each interferer is = 5 dB.
This scenario could be achieved through a ring topology for 10 FBSs with equal
transmission powers and an MUE user at the center of the ring. Furthermore,
consider that the received SNR from the MBS is
m
= 15.13 dB such that the
mean SINR at the MUE is 0 dB. Suppose that the MBS applies egoistic g-mode 1
with N
p
= 2 bits and that all interferers apply altruistic g-mode 1 with N
p
= 2
bits. From Fig. 6.9, we observe that the resulting CDF of the SINR provides an
almost perfect match with the simulation values. The resulting gain of command-
ing 10 interferers to become altruistic can be observed from the improvement in
the 50th-percentile SINR value by approximately 7 dB, as shown in Fig. 6.9.
57
CHAPTER 6. ALTRUISTIC BEAMFORMING IN MULTIPLE
INTERFERENCE SOURCES
6.5 Performance Degradation at the FUE
So far, we have dealt only with the performance of the MUE. Initially, from the
perspective of an FUE served by an egoistic FBS, the SINR follows a
2
distri-
bution with 4 degrees of freedom and mean (
f
f
, where (
f
is the beamforming
gain from the TBF method applied at the FBS, and
f
is the mean SINR per-
ceived at the FUE. This is due to the fact that all of its perceived interferers (i.e.
the remaining FBSs and the MBS) are treated as background noise, since no co-
channel interference mitigation is performed by other BSs towards the particular
FUE (i.e. [o
A
f
[ = 0). The CDF of the SINR for the FUE, assuming that its
serving FBS is egoistic, is given by
F
Z
(0)
fue
(z) = 1
_
1 +
2z
(
f
_
e
2z
G
f
z 0, (6.16)
where Z
(0)
fue
denotes the SINR at the FUE with 0 dominant altruistic interferers,
and
f
f,|S
A
f
|=0
denotes the respective mean SINR at the FUE.
When the FBS shifts its behavior from egoistic to altruistic, the desired signal
X received by its associated FUE becomes exponentially distributed with mean
f
. Then, the SINR at the FUE follows an exponential distribution:
F
Z
(0)
fue
(z) = 1 e
z
f
, z 0. (6.17)
Mean loss of performance for each FUE, when its serving FBS applies altruistic
TBF, is equal to the beamforming gain ( that is not present anymore. In a high
SINR regime, this is usually equivalent to an insignicant loss in achievable data
rate.
58
Chapter 7
Extensions of Altruistic
Beamforming Methods
So far, in order to improve performance of an interfered MUE in a HetNet set-
ting, we have used the practical algorithms of TSC, g-mode 1 and g-mode 2 for
interference mitigation exactly as found in [66][73] for the two-antenna case. In
this chapter, we investigate modications of these methods to
1. include more precise amplitude feedback, and
2. to work eciently when transmitters possess more than two transmit an-
tennas.
As an initial study, we will concentrate in adding one more bit for amplitude
resolution in the feedback message of g-mode 2. In addition, we will present our
multi-antenna interference scheme for the case of 4 antennas, which can easily be
generalized for 2
n
, where n N represents the number of transmit antennas.
7.1 Increasing Amplitude Feedback Resolution
Although the feedback message of g-mode 2 contains information about the order
of channel gain amplitudes, it is clear that primary emphasis has been given on
the phase resolution. For the case of two transmit antennas, g-mode 2 dedicates
only one bit for the feedback of channel amplitude information. Therefore, the
only permitted action regarding amplitude information is feeding back to the
transmitter the index corresponding to the strongest/weakest antenna. Consider
the case where the amplitudes of the two channel gains are approximately equal.
59
CHAPTER 7. EXTENSIONS OF ALTRUISTIC BEAMFORMING
METHODS
Then, the receiver must identify and send back to the transmitter the index of the
best antenna (i.e., for interference mitigation, the one with the weakest channel),
without providing information about the strength relationship between antennas.
Thus, considering optimal amplitude weights, approximately 80 % of the power
will be allocated to the slightly better antenna, and only 20 % to the weaker
antenna, although their channel conditions are similar. This example signies
that knowledge of the relative strength between the two channel gains (i.e., soft
order information) could further improve the performance of g-mode 2.
In this section, we investigate the performance of increased amplitude feedback
resolution for altruistic beamforming, in cases where interferers are equipped
with two transmit antennas. More specically, we consider that the feedback
message contains two bits dedicated to amplitude information and the remaining
for phase. We dene a threshold value for the dierence between the amplitudes
of the two channel gains. Then, dierent amplitude weights are applied when
the instantaneous amplitude dierence of the channel gains is higher or lower
than the predened threshold. By means of a brute force search, we identify the
optimal amplitude weights that should be applied for a given threshold. More
specically, we vary the threshold value between the two channel gain amplitudes
from 1 to 10 dB in unitary dB steps. Then, for each threshold, brute force
search is performed to nd optimal amplitude weights for cases where the channel
amplitude dierence is above and below the threshold. The optimal amplitude
weights for a list of threshold values are shown in tables 7.1-7.4, together with
the respective SNR gains perceived by the victim MUE on the interference link
(i.e. the weaker the signal received, the higher the gain for the MUE), against the
case where no beamforming is used and SNR gain is 0 dB. Each amplitude weight
vector contains two amplitude weights, with the rst/smallest value applied to
the strongest antenna. In all cases, the optimal threshold values for a xed-length
feedback message are shown in bold. These are the values that will be chosen for
comparisons against traditional g-mode 2.
60
7.1. INCREASING AMPLITUDE FEEDBACK RESOLUTION
Table 7.1: Soft-order g-mode 2 with 1 bit for phase and 2 bits for amplitude. Gains are
concentrated around the value of 6 dB, with the best gain equal to 6.1 dB, achieved for threshold
equal to 5 dB.
N
b
= 3 bits Optimal Amplitude Weights
Threshold T (dB) [[h
1
(dB)[ [h
2
(dB)[[> T [[h
1
(dB)[ [h
2
(dB)[[ T Gain (dB)
1 [
0.1230
0.8770] [
0.4550
0.5450] 5.66
2 [
0.1020
0.8980] [
0.4130
0.5870] 5.87
3 [
0.0830
0.9170] [
0.3730
0.6270] 6.01
4 [
0.0680
0.9320] [
0.3380
0.6620] 6.08
5 [
0.0550
0.9450] [
0.3060
0.6940] 6.10
6 [
0.0440
0.9560] [
0.2780
0.7220] 6.07
7 [
0.0350
0.9650] [
0.2550
0.7450] 6.03
8 [
0.0280
0.9720] [
0.2360
0.7640] 5.96
9 [
0.0220
0.9780] [
0.2190
0.7810] 5.89
10 [
0.0180
0.9820] [
0.2060
0.7940] 5.82
Table 7.2: Soft-order g-mode 2 with 2 bits for phase and 2 bits for amplitude. The best gain
is 10.74 dB, achieved for threshold equal to 6 dB.
N
b
= 4 bits Optimal Amplitude Weights
Threshold T (dB) [[h
1
(dB)[ [h
2
(dB)[[> T [[h
1
(dB)[ [h
2
(dB)[[ T Gain (dB)
1 [
0.1830
0.8170] [
0.4680
0.5320] 9.38
2 [
0.1580
0.8420] [
0.4380
0.5620] 9.91
3 [
0.1340
0.8660] [
0.4080
0.5920] 10.32
4 [
0.1130
0.8870] [
0.3810
0.6190] 10.60
5 [
0.0940
0.9060] [
0.3560
0.6440] 10.73
6 [
0.0780
0.9220] [
0.3330
0.6670] 10.74
7 [
0.0640
0.9360] [
0.3130
0.6870] 10.65
8 [
0.0520
0.9480] [
0.2960
0.7040] 10.50
9 [
0.0420
0.9580] [
0.2810
0.7190] 10.31
10 [
0.0350
0.9650] [
0.2690
0.7310] 10.12
61
CHAPTER 7. EXTENSIONS OF ALTRUISTIC BEAMFORMING
METHODS
Table 7.3: Soft-order g-mode 2 with 3 bits for phase and 2 bits for amplitude. The best gain
is 14.34 dB, achieved for threshold equal to 6 dB.
N
b
= 5 bits Optimal Amplitude Weights
Threshold T (dB) [[h
1
(dB)[ [h
2
(dB)[[> T [[h
1
(dB)[ [h
2
(dB)[[ T Gain (dB)
1 [
0.2000
0.8000] [
0.4700
0.5300] 11.56
2 [
0.1730
0.8270] [
0.4410
0.5590] 12.48
3 [
0.1480
0.8520] [
0.4140
0.5860] 13.28
4 [
0.1250
0.8750] [
0.3880
0.6120] 13.91
5 [
0.1040
0.8960] [
0.3650
0.6350] 14.27
6 [
0.0860
0.9140] [
0.3440
0.6560] 14.34
7 [
0.0710
0.9290] [
0.3260
0.6740] 14.18
8 [
0.0590
0.9410] [
0.3110
0.6890] 13.89
9 [
0.0480
0.9520] [
0.2970
0.7030] 13.52
10 [
0.0390
0.9610] [
0.2850
0.7150] 13.14
Table 7.4: Soft-order g-mode 2 with 4 bits for phase and 2 bits for amplitude. The best gain
is 16.22 dB, achieved for threshold equal to 6 dB.
N
b
= 6 bits Optimal Amplitude Weights
Threshold T (dB) [[h
1
(dB)[ [h
2
(dB)[[> T [[h
1
(dB)[ [h
2
(dB)[[ T Gain (dB)
1 [
0.2040
0.7960] [
0.4710
0.5290] 12.42
2 [
0.1770
0.8230] [
0.4430
0.5570] 13.54
3 [
0.1520
0.8480] [
0.4160
0.5840] 14.58
4 [
0.1270
0.8730] [
0.3900
0.6100] 15.52
5 [
0.1060
0.8940] [
0.3670
0.6330] 16.08
6 [
0.0880
0.9120] [
0.3470
0.6530] 16.22
7 [
0.0730
0.9270] [
0.3300
0.6700] 16.02
8 [
0.0600
0.9400] [
0.3150
0.6850] 15.59
9 [
0.0490
0.9510] [
0.3010
0.6990] 15.04
10 [
0.0400
0.9600] [
0.2890
0.7110] 14.52
62
7.1. INCREASING AMPLITUDE FEEDBACK RESOLUTION
Table 7.5: Comparison of soft-order g-mode 2 and traditional g-mode 2. As the number
of available bits increases, soft-order g-mode 2 continues to provide gains in cases where the
performance of traditional g-mode 2 begins to saturate.
g-mode 2 soft-order g-mode 2
Total Bits Phase Amplitude Gain (dB) Phase Amplitude Gain (dB)
3 2 1 8.73 1 2 6.10
4 3 1 10.70 2 2 10.74
5 4 1 11.34 3 2 14.34
6 5 1 11.59 4 2 16.22
Table 7.5 presents comparisons between the gains of altruistic g-mode 2 (1 bit
for amplitude and N
p
for phase) and the soft-order altruistic g-mode 2 presented
above (2 bits for amplitude and N
p
1 for phase) with threshold value equal to
6 dB. For g-mode 2, we apply the optimal amplitude weights [
0.2265
0.7735]
to the strongest and weakest antenna, respectively. We observe that g-mode 2
can provide similar or better performance than the soft-order g-mode 2 when
the feedback message is up to 4 bits long (i.e., including phase and amplitude
information) but after that point, increasing the phase resolution does not provide
signicant gains and performance becomes saturated. On the other hand, if the
feedback message is at least 5 bits long, allocating two bits to the amplitude part
of the feedback message provides gains of at least 3 dB against the respective
g-mode 2.
63
CHAPTER 7. EXTENSIONS OF ALTRUISTIC BEAMFORMING
METHODS
7.2 Increasing the Number of Transmit Anten-
nas
In the case of egoistic TBF, the algorithms of TSC, g-mode 1 and g-mode 2 are
applicable to cases in which transmitters are equipped with more than two anten-
nas. For g-mode 1, all phase modications are made against a reference antenna,
and, although this method is suboptimal and depends on the choice of reference
antenna, gains can be achieved. For g-mode 2, amplitudes can be chosen in such
a way that the strongest channel gains are favored. In the case of altruistic beam-
forming, though, adaptation of the algorithms is not as straightforward, except
for TSC. Clearly g-mode 1 does not work, since directing all channel gains in
phase opposition against just a single reference antenna is equivalent to a ran-
dom outcome in the received signal. The best choice would be for the interfered
MUE to test every possible beamforming vector of the predened codebook to
nd the optimal one, according to equation (3.2). The problem with this brute
force strategy is that it requires [J[ beamforming vector tests, where J is the
codebook containing all the possible beamforming vectors. For g-mode 1,
[J[ = 2
N
p
(N
t
1)
, (7.1)
where N
p
is the number of phase bits in the feedback message, and N
t
is the
number of transmit antennas. Therefore, when the number of antenna elements
grows from N
t
to 2N
t
, cardinality [J[ increases rapidly by a factor of 2
N
p
N
t
.
Thus, nding the optimal weight requires heavy computations and possibly high
delays, as transmitters become equipped with more and more antennas.
One option to bypass this problem is to group antenna elements in pairs.
Then, application of altruistic g-mode 1 or g-mode 2 in their initial two-antenna
form is possible, and the resulting channel gains from each pair are again grouped
until only one channel gain remains. This algorithm requires multi-stage appli-
cation of TBF, and can provide gains simply applying the original two-antenna
algorithms multiple times. With this scheme, the gains are suboptimal, but the
advantage is its more practical implementation against the brute force method
mentioned above.
We will consider the case where transmitters are equipped with N
t
= 4 trans-
mit antennas. Antennas are not ranked according to their channel gain amplitude
orders, but are randomly grouped into two pairs. Then, in the rst stage, the
same altruistic TBF method is applied to each pair separately. The outcome is
64
7.2. INCREASING THE NUMBER OF TRANSMIT ANTENNAS
Table 7.6: Interference Mitigation for the case of four transmit antennas by grouping antennas
in pairs and applying altruistic TBF in two stages.
Antennas 1 - 2 Bits Antennas 3 - 4 Bits Combination Bits SNR(dB) Total Bits
TSC 1 TSC 1 TSC 1 6.04 3
TSC 1 TSC 1 g-mode 1 2 8.32 4
TSC 1 TSC 1 g-mode 1 3 9.35 5
TSC 1 TSC 1 g-mode 2 3 11.71 5
TSC 1 TSC 1 g-mode 2 4 13.67 6
g-mode 1 2 g-mode 1 2 TSC 1 8.67 5
g-mode 1 2 g-mode 1 2 g-mode 1 2 10.3 6
g-mode 1 3 g-mode 1 3 TSC 1 10.3 7
g-mode 1 2 g-mode 1 2 g-mode 1 3 11.13 7
g-mode 1 2 g-mode 1 2 g-mode 2 3 13.98 7
g-mode 2 3 g-mode 2 3 TSC 1 11.87 7
g-mode 1 3 g-mode 1 3 g-mode 1 2 10.58 8
g-mode 1 2 g-mode 1 2 g-mode 2 4 15.81 8
g-mode 2 3 g-mode 2 3 g-mode 1 2 13.91 8
g-mode 1 3 g-mode 1 3 g-mode 1 3 11.14 9
g-mode 1 3 g-mode 1 3 g-mode 2 3 14.63 9
g-mode 2 4 g-mode 2 4 TSC 1 14.20 9
g-mode 2 3 g-mode 2 3 g-mode 1 3 14.86 9
g-mode 2 3 g-mode 2 3 g-mode 2 3 17.39 9
g-mode 1 3 g-mode 1 3 g-mode 2 4 16.01 10
g-mode 2 4 g-mode 2 4 g-mode 1 2 15.29 10
g-mode 2 3 g-mode 2 3 g-mode 2 4 19.31 10
g-mode 2 4 g-mode 2 4 g-mode 1 3 16.05 11
g-mode 2 4 g-mode 2 4 g-mode 2 3 19.14 11
g-mode 2 4 g-mode 2 4 g-mode 2 4 20.81 12
one modied channel gain from each pair. The two new channel gains are again
grouped into one pair and an altruistic TBF method is applied. The resulting
beamforming gains from dierent combinations and resolutions of TBF methods
can be seen in Table 7.6.
The option of using TSC in two stages is not ecient, since direct TSC for
65
CHAPTER 7. EXTENSIONS OF ALTRUISTIC BEAMFORMING
METHODS
4 antennas provides the same 6 dB gain with only 2 bits. The most ecient
combinations require the presence of g-mode 2, at least in the last stage. Com-
parisons with two-antenna schemes prove the eciency of having more antennas.
With as low as 5 feedback bits, performance of traditional two-antenna g-mode
2 with 4 bits (approximately 10.7 dB) is already surpassed (11.71 dB) and gains
continue to rise as the number of available feedback bits increases. The highest
gain is approximately 20.81 dB and requires exclusive usage of g-mode 2 with 4
bits for each pair. In total, 12 bits are required for the feedback message. It is
worth noting that a similar gain could be achieved with 9 bits (21.45 dB), if brute
force search was used to repeatedly test all 8
3
= 512 beamforming vectors of the
g-mode 1 codebook for four antennas. Therefore, the proposed scheme has the
advantage of not demanding time-consuming computations at the receiver side,
but the trade-o is that the feedback channel rate should be quite higher.
66
Chapter 8
Conclusions and Future Work
Cross-layer interference scenarios in two-tier heterogeneous networks could neg-
atively inuence the overall network performance. The bottleneck is usually the
downlink direction, since macro base stations are typically considered as primary
infrastructure. In this thesis, we have presented results about the performance
improvements that altruistic TBF can introduce to an MUE which is heavily
interfered by a group of FBSs.
8.1 Conclusions
We have derived analytical formulas for the upper bound of the received SINR at
the MUE, in cases where a single dominant interferer applies altruistic TBF with
perfect phase resolution. Results dictate that performance close to the upper
bound can practically be achieved by using as low as 4 feedback bits, instead of
innite.
We have investigated the case of multiple interferers, and derived the respec-
tive analytical results for the SINR improvements at the MUE. We deduce that
it is not vital to cancel every interferer, but only the cluster of closest interferers.
In practice, this number will typically be quite low, since FBSs are not installed
in every apartment and do not transmit 100 % of the time. Thus, altruistic
beamforming can provide great improvements with minimal sacrices.
Finally, we have investigated and presented simulation results about possible
extensions of the altruistic beamforming methods. By adding one more amplitude
bit in g-mode 2, we have observed that performance can be improved signicantly,
but only when the feedback message is at least 5 bits long. Similarly, we have
67
CHAPTER 8. CONCLUSIONS AND FUTURE WORK
tested an interference mitigation scheme that groups antennas in pairs and per-
forms altruistic TBF methods for each pair. This method is suboptimal, but can
provide similar gains to the two-antenna case with straightforward implementa-
tion.
8.2 Future Work
The work presented in this thesis could be extended in future studies, in the
following possible research directions:
1. Instead of including just one beamforming vector, the feedback message
from the interfered MUE towards each interferer FBS could include multiple
beamforming vectors that are sucient for combating received interference
at the MUE (e.g. as in [67]). Then, the interferer FBS is not forced to
behave altruistic, but has the capability to choose the beamforming vector
that degrades performance for its own FUE as little as possible. The number
of beamforming vectors that are fed back determines the level of bargaining
between the performance improvement of the MUE and the performance
degradation of the respective FUE. Further analysis and application of such
a feedback scheme to various two-tier scenarios is of great interest.
2. For the two-antenna case of soft-order g-mode 2 with 2 bits of amplitude
feedback, analytical work could be carried out for the derivation of the exact
amplitude weights that minimize interference, given the optimal thresh-
old value for the amplitude dierence. Furthermore, the performance of
g-mode 2 with more than 2 bits reserved for amplitude could be investi-
gated.
3. When transmitters are equipped with more than two transmit antennas,
useful approximations could be derived for ecient modeling of the prob-
ability distribution of the received SNR, when the goal is combating in-
terference by grouping the antenna elements. In addition, investigation of
new methods for direct interference mitigation without grouping of antenna
elements could be considered.
4. When transmitters are equipped with more than two transmit antennas,
useful approximations could be derived for ecient modeling of the prob-
ability distribution of the received SNR, when the goal is combating in-
68
8.2. FUTURE WORK
terference by grouping the antenna elements. In addition, investigation of
new methods for direct interference mitigation without grouping of antenna
elements could be considered.
69
CHAPTER 8. CONCLUSIONS AND FUTURE WORK
70
Bibliography
[1] Ericsson, On the Pulse of the Networking Society, White paper, Jun. 2012.
[2] Qualcomm Incorporated, LTE Advanced: Heterogeneous Networks,
White paper, Jan. 2011.
[3] H. Liang, J. I. Payne, H. S. Kim, Femto-Cells: Problem or Solution? A Net-
work Cost Analysis, in Proc. IEEE Global Telecommunications Conference,
pp. 1-6, Dec. 2011.
[4] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, J.
Zhang, Enhanced Intercell Interference Coordination Challenges in Hetero-
geneous Networks, IEEE Wireless Communications, vol. 41, no. 2, pp. 22-30,
Jun. 2011.
[5] A. Bou Saleh, S. Redana, B. Raaf, J. H am alainen, Comparison of Relay and
Pico eNB Deployments in LTE-Advanced, in Proc. IEEE Vehicular Technol-
ogy Conference, pp. 1-5, Sep. 2009.
[6] S. Kaimaletu, R. Krishnan, S. Kalyani, N. Akhtar, B. Ramamurthi, Cogni-
tive Interference Management in Heterogeneous Femto-Macro Cell Networks,
in Proc. IEEE International Conference on Communications, pp. 1-6, Jun.
2011.
[7] Femto Forum, Femto Forum Summary Report: Interference Management in
UMTS Femtocells, White paper, Feb. 2010.
[8] D. J. Love, R. W. Heath, V. K. N. Lau, D. Gesbert, B. D. Rao, M. Andrews,
An Overview of Limited Feedback in Wireless Communication Systems, IEEE
Journal on Selected Areas in Communications, vol. 26, no. 8, pp. 1341-1365,
Oct. 2008.
71
BIBLIOGRAPHY
[9] V. Chandrasekhar, J. G. Andrews, T. Muharemovic, Z. Shen, A. Gath-
erer, Power control in two-tier femtocell networks, IEEE Trans. on Wireless
Comm., vol. 8, no. 8, pp. 4316-4328, Aug. 2009.
[10] C. Karaiskos, A. A. Dowhuszko, J. H amal ainen, Performance of Altruistic
Beamforming for Mitigation of Multiple Cross-layer Interference Sources,
submitted to IEEE International Conference on Communications 2013.
[11] P. W. C. Chan, E. S. Lo, R. R. Wang, E. K. S. Au, V. K. N. Lau, R. S.
Cheng, W. Ho Mow, R.D. Murch, and K. Ben Letaief, The Evolution of 4G
Networks: FDD or TDD?, IEEE Communications Magazine, vol. 44, no. 12,
pp. 42-50, Dec. 2006.
[12] J. H. Winters, The Diversity Gain of Transmit Diversity in Wireless Systems
with Rayleigh Fading, IEEE Transactions on Vehicular Technology, pp. 1121-
1125, Feb. 1998.
[13] Motorola, Orthogonal Transmit Diversity for Direct Spread CDMA, ETSI
Contribution, Sep. 1997.
[14] B. Hochwald, T. L. Marzetta, C.B. Papadias, The Diversity Gain of Trans-
mit Diversity in Wireless Systems with Rayleigh Fading, IEEE Journal on
Selected Areas in Communications, vol. 19, no. 1, pp. 48-60, Feb. 2001.
[15] A. Heroike, F. Adachi, N. Nakajima, Combined Eects of Phase Sweeping
Transmitter Diversity and Channel Coding, IEEE Transactions on Vehicular
Technology, vol. 41, no. 2, pp. 170-176, May 1992.
[16] Samsung, Proposal for Downlink Time Switched Transmission Diversity,
ETSI Contribution, Germany 1998.
[17] Z. Liu, G. B. Giannakis, S. Zhou, B. Muquet, Space Time Coding for Broad-
band Wireless Communications, Wireless Communications and Mobile Com-
puting, vol. 1, no. 1, pp. 35-53, Jan. 2001.
[18] S. M. Alamouti, A Simple Transmit Diversity Technique for Wireless Com-
munications, IEEE Journal on Selected Areas in Communications, vol. 16,
no. 8, pp. 1451-1458, Oct. 1998.
[19] A. G. Dabak, S. Hosur, T. Schmidl, C. Sengupta, A Comparison of the Open
Loop Transmit Diversity Schemes for Third Generation Wireless Systems,
72
BIBLIOGRAPHY
in Proc. Wireless Communications and Networking Conference, pp. 437-442,
Sep. 2000.
[20] R. T. Derryberry, S. D. Gray, D. M. Ionescu, G. Mandyam, B. Raghothaman,
Transmit Diversity in 3G CDMA Systems, IEEE Communications Magazine,
vol. 40, no. 4, pp. 68-75, Apr. 2002.
[21] MIMO Techniques in WiMAX and LTE: a Feature Overview, IEEE Com-
munications Magazine, vol. 48, no. 5, pp. 86-92, May 2010.
[22] E. Visotsky, U. Madhow, SpaceTime Transmit Precoding with Imperfect
Feedback, IEEE Transactions on Information Theory, vol. 47, no. 6, Sep.
2001.
[23] S. A. Jafar, S. Vishwanath, A. J. Goldsmith, Channel Capacity and Beam-
forming for Multiple Transmit and Receive Antennas with Covariance Feed-
back, in Proc. IEEE International Conference on Communications, vol. 7,
pp. 2266-2270, Jun. 2001.
[24] E. A. Jorswieck and H. Boche, Channel Capacity and Capacity-Range of
Beamforming in MIMO Wireless Systems under Correlated Fading with Co-
variance Feedback, IEEE Transactions on Wireless Communications, vol. 3,
pp. 1543-1553, Sep. 2004.
[25] S. Srinivasa and S. A. Jafar, Capacity of the Isotropic Fading Multiple An-
tenna Downlink with Magnitude Feedback, in Proc. IEEE Vehicular Technol-
ogy Conference, vol. 3, pp. 2001-2005, Sep. 2004.
[26] K. K. Mukkavilli, A. Sabharwal, E. Erkip and B. Aazhang, On Beamforming
with Finite Rate Feedback in Multiple Antenna Systems, IEEE Transactions
on Information Theory, vol. 49, pp. 2562-2579, Oct. 2003.
[27] P. Xia, S. Zhou and G. B. Giannakis, Design and Analysis of Transmit
Beamforming Based on Limited-Rate Feedback, IEEE Transactions on Signal
Processing, vol. 54, pp. 1853-1863, May 2005.
[28] S. Srinivasa and S. A. Jafar, Vector Channel Capacity with Quantized Feed-
back, in Proc. IEEE International Conference on Communications, vol. 4,
pp. 2674-2678, May 2005.
73
BIBLIOGRAPHY
[29] J. C. Roh and B. D. Rao, Multiple Antenna Channels with Partial Chan-
nel State Information at the Transmitter, IEEE Transactions on Wireless
Communications, vol. 3, pp. 677-688, Mar. 2004.
[30] J. Hamal ainen, Performance Analysis of Multi-antenna and Multi-user
Methods for 3G and Beyond, PhD Dissertation, Espoo, 2007.
[31] S. Srinivasa, The Optimality of Beamforming: A Unied View, in Proc.
Global Telecommunications Conference, Dec. 2005.
[32] N. R. Sollenberger, Diversity and Automatic Link Transfer for a TDMA
Wireless Access Link, in Proc. IEEE Global Telecommunications Conference,
vol. 1, pp. 532-536, Dec. 1993.
[33] A. Narula, M. J. Lopez, M. D. Trott, and G. W. Wornell, Ecient Use of
Side Information in Multiple-antenna Data Transmission over Fading Chan-
nels, IEEE Journal on Selected Areas in Communications, vol. 16, pp. 1423-
1436, Oct. 1998.
[34] D. J. Love, R. W. Heath Jr., T. Strohmer, Grassmannian Beamforming for
Multiple-Input Multiple-Output Wireless Systems, in Proc. IEEE Interna-
tional Conference on Communications, vol. 4, pp. 2618-2622, May 2003.
[35] J. C. Roh, B. D. Rao, Transmit Beamforming in Multiple-Antenna Systems
With Finite Rate Feedback: A VQ-Based Approach, IEEE Transactions on
Information Theory, vol. 52, no. 3, pp. 1101-1112, Mar. 2006.
[36] A. Hottinen, O. Tirkkonen, R. Wichman, Multi-antenna Transceiver Tech-
niques for 3G and Beyond, Wiley, 2003.
[37] J. H amal ainen, R. Wichman, A. A. Dowhuszko, G. Corral-Briones, Capacity
of Generalized UTRA FDD Closed-Loop Transmit Diversity Modes, Wireless
Personal Communications: An International Journal archive vol. 54, no. 3,
pp. 467-484, Aug. 2010.
[38] A. Hottinen and R. Wichman, Transmit Diversity by Antenna Selection in
CDMA Downlink, in Proc. IEEE International Symposium on Spread Spec-
trum Techniques and Applications, vol. 3, pp. 767-770, Sep. 1998.
[39] J. H am alainen, R. Wichman, Performance Analysis of Closed-loop Transmit
Diversity in the Presence of Feedback Errors, in Proc. IEEE International
74
BIBLIOGRAPHY
Symposium on Personal, Indoor and Mobile Radio Communications, vol. 5,
pp. 2297-2301, Sep. 2002.
[40] R. W. Heath Jr. and A. Paulraj, A Simple Scheme for Transmit Diversity
Using Partial Channel Feedback, in Proc. Asilomar Conference on Signals,
Systems, Computers, pp. 1073-1078, Nov. 1998.
[41] D. J. Love, R. W. Heath Jr., Equal Gain Transmission in Multiple-Input
Multiple-Output Wireless Systems, IEEE Transactions on Communications,
vol. 51, no. 7, pp. 1102-1110, Jul. 2003.
[42] J. Ham al ainen, R. Wichman, Closed-Loop Transmit Diversity for FDD
WCDMA Systems, in Proc. Asilomar Conference on Signals, Systems and
Computers, vol. 1, pp. 111-115, Oct. 2000.
[43] H. S. Dhillon, R. K. Ganti, F. Baccelli, J. G. Andrews, Modeling and Anal-
ysis of K-Tier Downlink Heterogeneous Cellular Networks, IEEE Journal on
Selected Areas in Communications, vol. 30, no. 3, pp. 550-560, Apr. 2012.
[44] D. Lopez-Perez, A. Valcarce, G. De La Roche, E. Liu, J. Zhang, Access
Methods to WiMAX Femtocells: A Downlink System-level Case Study, in
Proc. IEEE International Conference on Communication Systems, pp. 1657-
1662, Nov. 2008.
[45] G. de la Roche, A. Valcarce, D. Lopez-Perez, J. Zhang, Access Control Mech-
anisms for Femtocells, IEEE Communications Magazine, vol. 48, no. 1, pp.
33-39, Jan. 2010.
[46] 3rd Generation Partnership Project, Technical Specication Group Radio
Access Network, 3G Home NodeB Study Item Technical Report, 3GPP TR
25.820 V8.0.0 (2008-03).
[47] 3rd Generation Partnership Project, Technical Specication Group Radio
Access Network, FDD Home eNode B (HeNB) Radio Frequency (RF) Re-
quirements Analysis, 3GPP TR 36.921 V9.0.0 (2010-03).
[48] M. Yavuz, F. Meshkati, S. Nanda, A. Pokhariyal, N. Johnson, B.
Raghothaman, A. Richardson, Interference Management and Performance
Analysis of UMTS/HSPA+ Femtocells, IEEE Communications Magazine,
vol. 47, no. 9, pp. 102-109, Sep. 2009.
75
BIBLIOGRAPHY
[49] Qualcomm Incorporated, R1-102350: Assessment of Rel-8/9 Techniques
Available to Cope with Harsh Interference Conditions, 3GPP TSG-RAN
WG1 60, Apr. 2010.
[50] CEWiT, R1-104106: Cognitive Interference Management for Femto-Macro
Scenarios, 3GPP TSG RAN1 61bis meeting, Jul. 2010.
[51] V. Chandrasekhar, J. G. Andrews, Spectrum Allocation in Two-tier Net-
works, in Proc. Asilomar Conference on Signals, Systems, Computers, pp.
1583-1587, Oct. 2008.
[52] Nokia Siemens Networks, Nokia, R1-101924: Macro+HeNB Performance
with Escape Carrier or Dynamic Carrier Selection, 3GPP TSG RAN WG1
60bis Meeting, Apr. 12-16, 2010.
[53] CATT, ITRI, R1-101786: Interference Mitigation via Direction Information
in Het-Net, 3GPP TSG RAN WG1 meeting 60bis, Apr. 2010.
[54] S. Rangan, Femto-Macro Cellular Interference Control with Subband
Scheduling and Interference Cancellation, in Proc. IEEE Globecom Work-
shop on Femtocell Networks, pp. 1-9, Jul. 2010.
[55] Motorola, R1-101121: HeNB Interference Management, 3GPP TSG-RAN
WG1 Meeting 60, Feb. 2010.
[56] G. Boudreau, J. Panicker, N. Guo, R. Chang, N. Wang, S. Vrzic, Interfer-
ence Coordination and Cancellation for 4G Networks, IEEE Communica-
tions Magazine, vol. 47, no. 4, pp. 74-81, Apr. 2009.
[57] S. Kaimaletu, R. Krishnan, S. Kalyani, N. Akhtar, B. Ramamurthi, Cogni-
tive Interference Management in Heterogeneous Femto-Macro Cell Networks,
in Proc. IEEE International Conference on Communications, pp. 1-6, Jun.
2011.
[58] NTT DOCOMO Incorporated, R1-083686: Views on Coordinated Multipoint
Transmission/Reception in LTE-Advanced, 3GPP TSG RAN WG1 Meeting
54bis, Sep. 2008.
[59] Ericsson, R1-082469: LTE-Advanced-Coordinated Multipoint Transmis-
sion/Reception, TSG-RAN WG1 53bis, Jul. 2008.
76
BIBLIOGRAPHY
[60] Huawei, R1-083049: Consideration on CoMP for LTE-Advanced, 3GPP
TSG RAN WG1 54, Aug. 2008.
[61] A. Papadogiannis, E. Hardouin, D. Gesbert, A Framework for Decentralising
Multi-Cell Cooperative Processing on the Downlink, in Proc. IEEE Global
Communications Conference Workshops, pp. 1-5, Dec. 2008.
[62] N. Sei, M. Viberg, R. W. Heath, J. Zhang, and M. Coldrey, Coordinated
Single-cell vs Multi-cell Transmission with Limited-capacity Backhaul, in
Proc. Asilomar Conference on Signals, Systems, Computers, pp. 1217-1221,
Nov. 2010.
[63] CELTIC/CP5-026 WINNER+, D1.4 Initial Report on Advanced Multiple
Antenna Systems, Technical Report, Jan. 2009.
[64] I. F. Akyildiz, D. M. Gutierrez-Estevez, E. C. Reyes, The Evolution to 4G
Cellular Systems: LTE-Advanced, Physical Communication, vol. 3, no. 4,
pp. 217-244, Dec. 2010.
[65] D. Lee, H. Seo, B. Clerckx, E. Hardouin, D. Mazzarese, S. Nagata, K. Sayana,
Coordinated Multipoint Transmission and Reception in LTE-Advanced: De-
ployment Scenarios and Operational Challenges, IEEE Communications
Magazine, vol. 50, no. 2, pp. 148-155, Feb. 2012.
[66] M. Husso, J. Ham alainen, R. Jantti, J. Li, E. Mutafungwa, R. Wichman,
Z. Zheng and A. M. Wyglinski, Performance of Practical Transmit Beam-
forming Methods for Interference Suppression in Closed-access Femtocells,
EURASIP Journal on Wireless Communications and Networking, pp. 1-12,
Jun. 2010.
[67] A. Elsherif, A. M. Ahmedin, Z. Ding, X. Liu, Adaptive precoding for fem-
tocell interference mitigation, in Proc. IEEE International Conference on
Communications, Jul. 2012.
[68] V. Chandrasekhar, J. G. Andrews, T. Muharemovic, Z. Shen, A. Gath-
erer, Power Control in Two-Tier Femtocell Networks, IEEE Transactions on
Wireless Communications, vol. 8, no. 8, pp. 4316-4328, Aug. 2009.
[69] Alcatel-Lucent, picoChip Designs, Vodafone, R4-092042: Simulation As-
sumptions and Parameters for FDD HeNB RF Requirements, 3GPP TSG
RAN WG4 (Radio) Meeting 51, May 2009.
77
BIBLIOGRAPHY
[70] V. Krishnan, Probability and Random Processes, Wiley Press, Chapter 13,
Section 4, pp. 233-238, 2006.
[71] I. S. Gradshtein, I. M. Ryzhik, A. Jerey, D. Zwillinger, Table of Integrals,
Series, And Products 7th edition, Elsevier Academic Press, 2007.
[72] A. A. Dowhuszko, G. Corral-Briones, J. H amal ainen, and R. Wichman, On
Throughput-Fairness Tradeo in Virtual MIMO Systems with Limited Feed-
back, EURASIP Journal on Wireless Communications and Networking, pp.
1-17, Jan. 2009.
[73] A. A. Dowhuszko, M. Husso, J. Li, J. Ham al ainen, Z. Zheng, Performance
of Practical Transmit Beamforming Methods for Interference Suppression in
Closed-access Femtocells, Future Network and Mobile Summit (FutureNetw),
pp. 1-12, Jun. 2011.
[74] S. Ross, Introduction to Probability Models, 9th ed., Elsevier Academic Press,
Chapter 5, Section 2.4, pp. 298-300, 2007.
[75] A. Papoulis, Probability, random variables, and stochastic processes, 3rd ed.,
McGraw-Hill Int. Ed., 1991.
78
Appendix A
Perfect Phase Feedback: PDF of
Egoistic Case
In this section, we present the procedure to obtain the PDF of
X =
x
[h
x
w
x
[
2
max
=
x
2
([h
x1
[ +[h
x2
[)
2
, (A.1)
following the procedure found in [70] for determining the PDF of an RV which is
a function of multiple RVs.
We have assumed that h
x1
, h
x2
are complex Gaussian RVs with zero mean and
unitary variance, so Reh
x1
, Reh
x2
A(0,
1
2
) and Imh
x1
, Imh
x2
A(0,
1
2
).
Thus, each amplitude [h
x1
[ and [h
x2
[ follows a Rayleigh distribution with =
1
2
.
For simplicity, notation of the above RVs will be U =[h
x1
[ and V =[h
x2
[. Then,
we need to prove the PDF of X =
x
2
(U + V )
2
.
The PDFs of U and V are given by
f
U
(u) =
u
2
e
(
u
2
2
2
)
, u > 0, (A.2)
f
V
() =
2
e
(
2
2
2
)
, > 0, (A.3)
respectively. Since U and V are independent, their joint PDF is given by
f
U,V
(u, ) =
u
4
e
(
u
2
+
2
2
2
)
, u, > 0. (A.4)
In order to simplify the derivation of f
X
(x), we will use the auxiliary random
variable W = U, so that we have two functions of two random variables. Solving
x =
x
2
(u + )
2
for , setting u = w and taking into account that all RVs are
79
APPENDIX A. PERFECT PHASE FEEDBACK: PDF OF EGOISTIC CASE
positive, we obtain the only acceptable solution
1
=
_
2x
x
w, with 0 < w <
_
2x
x
.
The Jacobian matrix and its absolute determinant are
J =
_
x
(u + )
x
(u + )
1 0
_
[[J[[ = [u + [ =
_
2
x
x. (A.5)
The joint density function f
XW
(x, w) is given by
f
XW
(x, w) =
f
UV
(w,
_
2x
x
w)
[[J[[
=
w(
_
2x
x
w)
2
x
x
e
(w
2
+(
2x
x
w)
2
)
2
2
=
w
_
2x
x
w
2
2
x
x
e
(w
2
+w
2
+
2x
x
2w
2x
x
)
2
2
=
(w
2
w
_
2x
x
+
2x
4
x
) +
2x
4
x
2
x
x
e
(w
2
w
2x
x
+
2x
2
x
)
2
=
(w
2x
2
x
)
2
+
2x
4
x
2
x
x
e
(w
2x
2
x
)
2
2x
4
x
2
=
e
x
2
x
2
x
x
_
(w
2x
2
x
)
2
4
e
(w
2x
2
x
)
2
2
+
x
2
x
4
e
(w
2x
2
x
)
2
2
_
. (A.6)
In order to derive f
X
(x), we now integrate over all w, with 0 < w <
_
2x
x
, i.e.,
f
X
(x) =
e
x
2
x
2
x
x
_
_
2x
x
0
(w
2x
2
x
)
2
4
e
(w
2x
2
x
)
2
2
dw +
x
2
x
4
e
(w
2x
2
x
)
2
2
dw
_
(A.7)
=
e
x
2
x
2
x
x
(A + B) . (A.8)
80
We will compute the integrals separately, using variable substitution:
A =
_
2x
x
0
(w
2x
2
x
)
2
4
e
(w
2x
2
x
)
2
2
dw
_
variable substitution: k =
(w
2x
2
x
)
_
=
_
2x
2
2x
2
k
2
2
e
k
2
dk
=
1
_
2x
2
2x
2
k
2
e
k
2
dk
=
1
_
1
4
erf(k)
1
2
e
k
2
k
_
2x
2
2x
2
=
1
_
1
2
erf
_
2x
2
2x
2
x
2
x
2
_
. (A.9)
B =
_
2x
x
0
x
2
x
4
e
(w
2x
2
x
)
2
2
dw
_
variable substitution: k =
(w
2x
2
x
)
_
=
x
2
x
4
_
2x
2
2x
2
e
k
2
dk
=
x
4
x
3
2
_
2x
2
2x
2
e
k
2
dk
=
x
4
x
3
_
erfc
_
2x
2
_
erfc
_
2x
2
__
=
x
2
x
3
erf
_
2x
2
_
. (A.10)
Therefore,
f
X
(x) =
e
x
2
x
2
2
2
x
x
_
erf
_
2x
2
_
+
2x
x
2
x
2
+
x
2
erf
_
2x
2
__
.
(A.11)
81
APPENDIX A. PERFECT PHASE FEEDBACK: PDF OF EGOISTIC CASE
Now, derivation of the PDF of (A.1) is possible, by substitution of =
1
2
:
f
X
(x) =
e
x
x
2
x
x
_
erf
__
x
x
_
+ 2
_
x
x
e
x
x
+
2x
x
erf
__
x
x
__
. (A.12)
82
Appendix B
Perfect Phase Feedback:
Calculation of SINR
In order to nd F
Z
(z) =
_
1
F
X
(zt)f
Y
(t 1)dt, the following integrals must be
solved and added:
83
APPENDIX B. PERFECT PHASE FEEDBACK: CALCULATION OF SINR
1
_
1
zt
x
e
zt
x
erf
_
zt
x
_
e
t1
y
2
_
y
(t 1)
dt, (B.1)
2
_
1
zt
x
e
zt
x
erf
_
zt
x
_
e
t1
y
2
_
y
(t 1)
erf
_
t 1
y
_
dt, (B.2)
3
_
1
zt
x
e
zt
x
erf
_
zt
x
_
e
t1
y
y
e
t1
y
dt, (B.3)
4
_
1
zt
x
e
zt
x
erf
_
zt
x
_
e
t1
y
t 1
y
dt, (B.4)
5
_
1
zt
x
e
zt
x
erf
_
zt
x
_
e
t1
y
t 1
y
erf
_
t 1
y
_
dt, (B.5)
6
_
1
e
2zt
x
e
t1
y
2
_
y
(t 1)
dt, (B.6)
7
_
1
e
2zt
x
e
t1
y
2
_
y
(t 1)
erf
_
t 1
y
_
dt, (B.7)
8
_
1
e
2zt
x
e
t1
y
y
e
t1
y
dt, (B.8)
9
_
1
e
2zt
x
e
t1
y
t 1
y
dt, (B.9)
10
_
1
e
2zt
x
e
t1
y
t 1
y
erf
_
t 1
y
_
dt, (B.10)
11
_
1
e
t1
y
2
_
y
(t 1)
dt, (B.11)
12
_
1
t1
y
2
_
y
(t 1)
erf
_
t 1
y
_
dt, (B.12)
13
_
1
e
t1
y
y
e
t1
y
dt, (B.13)
14
_
1
t1
y
t 1
y
dt, (B.14)
15
_
1
e
t1
y
t 1
y
erf
_
t 1
y
_
dt. (B.15)
84
The results obtained were:
a
z
= 1 +
x
z
y
, b
z
=
z
x
, c
z
=
x
z
y
, k
i
=
(1)
i
i!(2i + 1)
, (B.16)
1 =
_
1
2
_
e
1
y
n=0
k
n
a
n+
5
2
2
z
b
n+
1
2
2
z
c
1
2
z
e
a
z
b
z
2
W
n+
3
2
2
,
n
3
2
2
_
a
z
b
z
_
, (B.17)
2 = 2 e
1
y
n=0
m=0
k
n
k
m
a
n+m+3
2
z
b
n+m+1
2
z
c
m+1
z
(m + 1) e
a
z
b
z
2
Wnm+1
2
,
nm2
2
_
a
z
b
z
_
, (B.18)
3 = 2 e
b
z
n=0
n+1
m=0
k
n
(n + 1)! b
m
z
c
z
m! (1 + 2c
z
)
nm+2
, (B.19)
4 = 2
_
3
2
_
e
1
y
n=0
k
n
a
n+
7
2
2
z
b
n+
3
2
2
z
c
3
2
z
e
a
z
b
z
2
W
n+
1
2
2
,
n
5
2
2
_
a
z
b
z
_
, (B.20)
5 = 4e
1
y
n=0
m=0
k
n
k
m
a
n+m+4
2
z
b
n+m+2
2
z
c
m+2
z
(m + 2) e
a
z
b
z
2
Wnm
2
,
nm3
2
_
a
z
b
z
_
, (B.21)
6 =
2
e
2b
z
_
1 +
2
c
z
, (B.22)
7 =
e
2b
z
_
2 tan
1
__
1 +
2
c
z
_
_
2
_
1 +
2
c
z
, (B.23)
8 =
e
2b
z
2(1 +
1
c
z
)
, (B.24)
9 =
e
2b
z
2(1 +
2
c
z
)
3
2
, (B.25)
10 = e
2b
z
_
2(1 +
2
c
z
)
3
2
tan
1
__
1 +
2
c
z
_
(1 +
2
c
z
)
3
2
+
1
2(1 +
2
c
z
)(2 +
2
c
z
)
_
, (B.26)
11 =
2
, (B.27)
12 =
4
, (B.28)
13 =
1
2
, (B.29)
14 =
2
, (B.30)
15 =
4
+
1
2
. (B.31)
85
APPENDIX B. PERFECT PHASE FEEDBACK: CALCULATION OF SINR
For calculation of integrals 1 - 5 , the following expressions were useful:
erf(x) =
2
n=0
(1)
n
x
2n+1
n!(2n + 1)
, (B.32)
_
u
x
n
e
x
dx = e
u
n
k=0
n!
k!
u
k
nk+1
, (B.33)
_
u
x
1
(x u)
1
e
x
dx =
+
2
u
+2
2
()e
u
2
W
2
,
1
2
(u), (B.34)
where W is the Whittaker function.
For calculation of integrals 6 - 10 and 11 - 15 , the following expressions were
useful:
_
0
e
qx
x
dx =
_
q
, (B.35)
_
0
1
x
erfc(
x)e
x
dx =
2tan
1
(
, (B.36)
_
0
x erfc(
x)e
x
dx =
1
_
tan
1
(
3
2
1
(1 + )
_
, (B.37)
_
0
x
n
1
2
e
x
dx =
2
n
n
1
2
(2n 1)!!, (B.38)
where (2n-1)!! denotes the double factorial, which is equal to
(2n)!
2
n
n!
. The nal
expression is the sum of the integrals 1 - 15 .
86